[HTML][HTML] Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

A survey of intelligent detection designs of HTML URL phishing attacks

S Asiri, Y **ao, S Alzahrani, S Li, T Li - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social
engineering attacks where an attacker deceives users by sending fake messages using …

Attacks on formation control for multiagent systems

Y Yang, Y **ao, T Li - IEEE Transactions on Cybernetics, 2021 - ieeexplore.ieee.org
Multiagent systems (MASs) are distributed systems with two or more intelligent agents.
Formation control is a significant control technique of MASs. To date, formation control on …

How to disturb network reconnaissance: A moving target defense approach based on deep reinforcement learning

T Zhang, C Xu, J Shen, X Kuang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the explosive growth of Internet traffic, large sensitive and valuable information is at risk
of cyber attacks, which are mostly preceded by network reconnaissance. A moving target …

Swarm intelligence inspired intrusion detection systems—a systematic literature review

MH Nasir, SA Khan, MM Khan, M Fatima - Computer Networks, 2022 - Elsevier
Abstract An Intrusion Detection System (IDS) is one of the fundamental building blocks in
securing a network. A huge number of techniques have been proposed and implemented to …

Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model

B Bojarajulu, S Tanwar, TP Singh - Computers & Security, 2023 - Elsevier
The botnet have developed into a severe risk to Internet of Things (IoT) systems as a result
of manufacturers 'insufficient security policies and end users' lack of security awareness. By …

A survey of ddos attack and defense technologies in multi-access edge computing

Y Ma, L Liu, Z Liu, F Li, Q **e, K Chen… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Multiaccess edge computing (MEC) is a novel service paradigm located at the network's
edge, where servers with computation and storage capabilities are placed in proximity to …

[HTML][HTML] Predicting ddos attacks using machine learning algorithms in building management systems

İ Avcı, M Koca - Electronics, 2023 - mdpi.com
The rapid growth of the Internet of Things (IoT) in smart buildings necessitates the
continuous evaluation of potential threats and their implications. Conventional methods are …

Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks

H Cheng, J Liu, T Xu, B Ren, J Mao… - … Journal of Sensor …, 2020 - inderscienceonline.com
The software-defined network (SDN) enabled internet of things (IoT) architecture is deployed
in many industrial systems. The ability of SDN to intelligently route traffic and use …

Secure state estimation with switched compensation mechanism against DoS attacks

JJ Yan, GH Yang - IEEE Transactions on Cybernetics, 2021 - ieeexplore.ieee.org
This article is concerned with the secure state estimation problem for cyber-physical systems
under intermittent denial-of-service (DoS) attacks. Based on a switching scheme and the …