Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review

P Shukla, CR Krishna, NV Patil - The Journal of Supercomputing, 2024 - Springer
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …

An improved mutual information feature selection technique for intrusion detection systems in the Internet of Medical Things

M Alalhareth, SC Hong - Sensors, 2023 - mdpi.com
In healthcare, the Internet of Things (IoT) is used to remotely monitor patients and provide
real-time diagnoses, which is referred to as the Internet of Medical Things (IoMT). This …

A fully streaming big data framework for cyber security based on optimized deep learning algorithm

N Hussen, SM Elghamrawy, M Salem… - IEEE …, 2023 - ieeexplore.ieee.org
Real-time deep learning faces the challenge of balancing accuracy and time, especially in
cybersecurity where intrusion detection is crucial. Traditional deep learning techniques have …

[HTML][HTML] Robust key parameter identification of dedicated hybrid engine performance indicators via K-fold filter collaborated feature selection

X He, J Li, Q Zhou, G Lu, H Xu - Engineering Applications of Artificial …, 2023 - Elsevier
Dedicated hybrid engine technology using auxiliary electronic components has been proven
as an energy-saving solution to public concerns about energy consumption and carbon …

A hybrid Ant Lion Optimization algorithm based lightweight deep learning framework for cyber attack detection in IoT environment

BB Gupta, A Gaurav, RW Attar, V Arya, S Bansal… - Computers and …, 2025 - Elsevier
Abstract Internet of Things (IoTs) are integral part of Web3, in which they are used for
information collecting and sharing. However, the limited storage capacity of IoT decides …

Enhancing smart grid reliability through cross-domain optimization of IoT sensor placement and communication links

S Sarin, SK Singh, S Kumar, S Goyal, BB Gupta… - Telecommunication …, 2025 - Springer
The increasing complexity and demands of modern power grids necessitate advanced
solutions for real-time monitoring and control. This paper presents a novel cross-domain …

Comparing Metaheuristic Search Techniques in Addressing the Effectiveness of Clustering-Based DDoS Attack Detection Methods

A Zeinalpour, CP McElroy - Electronics, 2024 - mdpi.com
Distributed Denial of Service (DDoS) attacks have increased in frequency and sophistication
over the last ten years. Part of the challenge of defending against such attacks requires the …

ERAM-EE: Efficient resource allocation and management strategies with energy efficiency under fog–internet of things environments

P Periasamy, R Ujwala, K Srikar, YV Durga Sai… - Connection …, 2024 - Taylor & Francis
Due to technological advancements, most devices are generating a significant amount of
data which needs appropriate technology to handle the data generated by IoT devices. Fog …

DoS Attack Detection Using Feature Selection with Information Gain and ML Classification

SV Dicholkar, JH Nirmal - 2024 Second International …, 2024 - ieeexplore.ieee.org
Designing an Intrusion Detection System (IDS) for attack detection in IoT networks is done
by applying different machine learning and deep learning approaches. Standard CIE …

A Hybrid Convolutional Neural Networks and Logistic Regression Framework for Robust Cyber Attack Detection in Artificial Intelligence of Things (AIoT)

BB Gupta, A Gaurav, V Arya… - 2024 IEEE Annual …, 2024 - ieeexplore.ieee.org
In the current environment of the Artificial Intelligence of Things (AIoT), the necessity to
develop efficient cyber attack detection systems is essential. In this regard, this paper …