Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …
An improved mutual information feature selection technique for intrusion detection systems in the Internet of Medical Things
M Alalhareth, SC Hong - Sensors, 2023 - mdpi.com
In healthcare, the Internet of Things (IoT) is used to remotely monitor patients and provide
real-time diagnoses, which is referred to as the Internet of Medical Things (IoMT). This …
real-time diagnoses, which is referred to as the Internet of Medical Things (IoMT). This …
A fully streaming big data framework for cyber security based on optimized deep learning algorithm
Real-time deep learning faces the challenge of balancing accuracy and time, especially in
cybersecurity where intrusion detection is crucial. Traditional deep learning techniques have …
cybersecurity where intrusion detection is crucial. Traditional deep learning techniques have …
[HTML][HTML] Robust key parameter identification of dedicated hybrid engine performance indicators via K-fold filter collaborated feature selection
Dedicated hybrid engine technology using auxiliary electronic components has been proven
as an energy-saving solution to public concerns about energy consumption and carbon …
as an energy-saving solution to public concerns about energy consumption and carbon …
A hybrid Ant Lion Optimization algorithm based lightweight deep learning framework for cyber attack detection in IoT environment
BB Gupta, A Gaurav, RW Attar, V Arya, S Bansal… - Computers and …, 2025 - Elsevier
Abstract Internet of Things (IoTs) are integral part of Web3, in which they are used for
information collecting and sharing. However, the limited storage capacity of IoT decides …
information collecting and sharing. However, the limited storage capacity of IoT decides …
Enhancing smart grid reliability through cross-domain optimization of IoT sensor placement and communication links
The increasing complexity and demands of modern power grids necessitate advanced
solutions for real-time monitoring and control. This paper presents a novel cross-domain …
solutions for real-time monitoring and control. This paper presents a novel cross-domain …
Comparing Metaheuristic Search Techniques in Addressing the Effectiveness of Clustering-Based DDoS Attack Detection Methods
A Zeinalpour, CP McElroy - Electronics, 2024 - mdpi.com
Distributed Denial of Service (DDoS) attacks have increased in frequency and sophistication
over the last ten years. Part of the challenge of defending against such attacks requires the …
over the last ten years. Part of the challenge of defending against such attacks requires the …
ERAM-EE: Efficient resource allocation and management strategies with energy efficiency under fog–internet of things environments
P Periasamy, R Ujwala, K Srikar, YV Durga Sai… - Connection …, 2024 - Taylor & Francis
Due to technological advancements, most devices are generating a significant amount of
data which needs appropriate technology to handle the data generated by IoT devices. Fog …
data which needs appropriate technology to handle the data generated by IoT devices. Fog …
DoS Attack Detection Using Feature Selection with Information Gain and ML Classification
SV Dicholkar, JH Nirmal - 2024 Second International …, 2024 - ieeexplore.ieee.org
Designing an Intrusion Detection System (IDS) for attack detection in IoT networks is done
by applying different machine learning and deep learning approaches. Standard CIE …
by applying different machine learning and deep learning approaches. Standard CIE …
A Hybrid Convolutional Neural Networks and Logistic Regression Framework for Robust Cyber Attack Detection in Artificial Intelligence of Things (AIoT)
BB Gupta, A Gaurav, V Arya… - 2024 IEEE Annual …, 2024 - ieeexplore.ieee.org
In the current environment of the Artificial Intelligence of Things (AIoT), the necessity to
develop efficient cyber attack detection systems is essential. In this regard, this paper …
develop efficient cyber attack detection systems is essential. In this regard, this paper …