[HTML][HTML] Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges
Abstract The application of Machine Learning (ML) techniques to the well-known intrusion
detection systems (IDS) is key to cope with increasingly sophisticated cybersecurity attacks …
detection systems (IDS) is key to cope with increasingly sophisticated cybersecurity attacks …
Performance assessment of supervised classifiers for designing intrusion detection systems: a comprehensive review and recommendations for future research
Supervised learning and pattern recognition is a crucial area of research in information
retrieval, knowledge engineering, image processing, medical imaging, and intrusion …
retrieval, knowledge engineering, image processing, medical imaging, and intrusion …
Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection
H Ding, L Chen, L Dong, Z Fu, X Cui - Future Generation Computer Systems, 2022 - Elsevier
With the continuous emergence of various network attacks, it is becoming more and more
important to ensure the security of the network. Intrusion detection, as one of the important …
important to ensure the security of the network. Intrusion detection, as one of the important …
Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems
Blockchain technology is rapidly changing the transaction behavior and efficiency of
businesses in recent years. Data privacy and system reliability are critical issues that is …
businesses in recent years. Data privacy and system reliability are critical issues that is …
Fabric-IoT: A blockchain-based access control system in IoT
IoT devices have some special characteristics, such as mobility, limited performance, and
distributed deployment, which makes it difficult for traditional centralized access control …
distributed deployment, which makes it difficult for traditional centralized access control …
Secure data storage and recovery in industrial blockchain network environments
The massive redundant data storage and communication in network 4.0 environments have
issues of low integrity, high cost, and easy tampering. To address these issues, in this article …
issues of low integrity, high cost, and easy tampering. To address these issues, in this article …
IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities
The rapid proliferation of the Internet of Things (IoT) systems, has enabled transforming
urban areas into smart cities. Smart cities' paradigm has resulted in improved quality of life …
urban areas into smart cities. Smart cities' paradigm has resulted in improved quality of life …
A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles
A fundamental layer of smart cities, the Internet of Vehicles (IoV) can significantly improve
transportation efficiency, reduce energy consumption, and traffic accidents. However …
transportation efficiency, reduce energy consumption, and traffic accidents. However …
Cyber threats to industrial IoT: a survey on attacks and countermeasures
In today's Industrial Internet of Things (IIoT) environment, where different systems interact
with the physical world, the state proposed by the Industry 4.0 standards can lead to …
with the physical world, the state proposed by the Industry 4.0 standards can lead to …
Gtxchain: A secure iot smart blockchain architecture based on graph neural network
With the expansion of scale, the Internet of Things (IoT) suffers more and more security
threats, and vulnerability and sensitivity to attacks are also increasing. As a distributed and …
threats, and vulnerability and sensitivity to attacks are also increasing. As a distributed and …