[HTML][HTML] Deep Learning techniques for web-based attack detection in industry 5.0: a novel approach

A Salam, F Ullah, F Amin, M Abrar - Technologies, 2023 - mdpi.com
As the manufacturing industry advances towards Industry 5.0, which heavily integrates
advanced technologies such as cyber-physical systems, artificial intelligence, and the …

[HTML][HTML] Adversarial learning for Mirai botnet detection based on long short-term memory and XGBoost

V Vajrobol, BB Gupta, A Gaurav, HM Chuang - International Journal of …, 2024 - Elsevier
In today's world, where digital threats are on the rise, one particularly concerning threat is
the Mirai botnet. This malware is designed to infect and command a collection of Internet of …

Adaptive attack mitigation for iov flood attacks

E Gelenbe, M Nasereddin - IEEE Internet of Things Journal, 2025 - ieeexplore.ieee.org
Gateway Servers for the Internet of Vehicles (IoV) must meet stringent Security and Quality of
Service (QoS) requirements, including cyberattack protection, low delays and minimal …

Dynamic malware mitigation strategies for iot networks: A mathematical epidemiology approach

R Casado-Vara, M Severt, A Díaz-Longueira, ÁM Rey… - Mathematics, 2024 - mdpi.com
With the progress and evolution of the IoT, which has resulted in a rise in both the number of
devices and their applications, there is a growing number of malware attacks with higher …

Protecting iot servers against flood attacks with the quasi deterministic transmission policy

E Gelenbe, M Nasereddin - … on Trust, Security and Privacy in …, 2023 - ieeexplore.ieee.org
Servers at Supply Chains and othet Cyber-physical systems that receive packets from IoT
devices should meet the QoS needs of incoming packets, and protect the system from …

Securing the evolving IoT with deep learning: a comprehensive review

U Tariq, I Ahmed, AK Bashir, MA Khan - Kurdish Studies, 2024 - e-space.mmu.ac.uk
This paper explores how deep learning enhances Internet of Things (IoT) cybersecurity,
examining advanced methods like convolutional and recurrent neural networks for detailed …

IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements

A Kumar, L Kavisankar, S Venkatesan, M Kumar… - International Journal of …, 2025 - Springer
Abstract The Internet of Things (IoT) has the potential to bring unprecedented accessibility
and efficiency to a wide range of critical applications and access control services. With the …

Kitsune Dataset Analysis via BigData and Deep Learning Techniques

I Zelichenok, I Kotenko - 2024 IEEE Ural-Siberian Conference …, 2024 - ieeexplore.ieee.org
During the comprehensive digitalization of information processes, the amount of network
traffic is growing rapidly, which leads to an increase in the frequency and complexity of …

Attack Mitigation in Gateways of Pervasive Systems

E Gelenbe, M Nasereddin - arxiv preprint arxiv:2501.10159, 2025 - arxiv.org
In pervasive systems, mobile devices and other sensors access Gateways, which are
Servers that communicate with the devices, provide low latency services, connect them with …

[PDF][PDF] Behavioral Analysis of Backdoor Malware Exploiting Heap Overflow Vulnerabilities Using Data Mining and Machine Learning

AR Khaliq, S Ullah, T Ahmad… - Pakistan Journal of …, 2023 - pdfs.semanticscholar.org
Backdoor malware remains a persistent and elusive threat that successfully evades
conventional detection methods through intricate techniques, such as registry key …