A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions

H Ahmetoglu, R Das - Internet of Things, 2022 - Elsevier
Rapid developments in network technologies and the amount and scope of data transferred
on networks are increasing day by day. Depending on this situation, the density and …

[HTML][HTML] Federated Learning for IoT: A Survey of Techniques, Challenges, and Applications

E Dritsas, M Trigka - Journal of Sensor and Actuator Networks, 2025 - mdpi.com
Federated Learning (FL) has emerged as a pivotal approach for decentralized Machine
Learning (ML), addressing the unique demands of the Internet of Things (IoT) environments …

A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks

M Jeyaselvi, RK Dhanaraj, M Sathya, FH Memon… - Cluster …, 2023 - Springer
Abstract The Internet of Things (IoT) is a modern age technology, designed with the vision to
connect and also interconnect all the objects everywhere. Technological progressions …

[HTML][HTML] IoT intrusion detection system based on machine learning

B Xu, L Sun, X Mao, R Ding, C Liu - Electronics, 2023 - mdpi.com
With the rapid development of the Internet of Things (IoT), the number of IoT devices is
increasing dramatically, making it increasingly important to identify intrusions on these …

An intelligent IoT intrusion detection system using HeInit-WGAN and SSO-BNMCNN based multivariate feature analysis

J Wu, SA Haider, H Yu, M Irshad, M Soni… - … Applications of Artificial …, 2024 - Elsevier
Devices connected to the Internet of Things (IoT) are growing in popularity across multiple
industries. IoT links intelligent homes, buildings, businesses, and communities, and also …

An improved chacha algorithm for securing data on IoT devices

MS Mahdi, NF Hassan, GH Abdul-Majeed - SN Applied Sciences, 2021 - Springer
In recent years, revolution of development was exceedingly quick in the Internet.
Nevertheless, instead of only linking personal computers, mobiles and wearable …

An efficient and reliable chaos-based iot security core for udp/ip wireless communication

B Ilyas, SM Raouf, S Abdelkader, T Camel… - IEEE …, 2022 - ieeexplore.ieee.org
The ultimate focus of this paper is to provide a hyperchaos-based reconfigurable platform for
the real-time securing of communicating embedded systems interconnected in networks …

Enhancing explanation of lstm-based ddos attack classification using shap with pattern dependency

B AsSadhan, A Bashaiwth, H Binsalleeh - IEEE Access, 2024 - ieeexplore.ieee.org
DDoS attacks pose serious threats to the availability and reliability of computer networks.
With the increasing complexity of DDoS attacks, the accurate detection and classification of …

Practical challenges of attack detection in microgrids using machine learning

DT Ramotsoela, GP Hancke… - Journal of Sensor and …, 2023 - mdpi.com
The move towards renewable energy and technological advancements in the generation,
distribution and transmission of electricity have increased the popularity of microgrids. The …

An approach to enhance the security of unmanned aerial vehicles (UAVs)

NA Sabuwala, RD Daruwala - The Journal of Supercomputing, 2024 - Springer
There is a significant surge in unmanned aerial vehicles'(UAVs) popularity with an ongoing
increase in demand due to their multi-functional uses. The capacity of the UAVs to respond …