[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things

SVN Santhosh Kumar, M Selvi… - Computational …, 2023 - Wiley Online Library
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …

[PDF][PDF] Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization.

R Alkanhel, ESM El-kenawy… - … , Materials & Continua, 2023 - researchgate.net
Applications of internet-of-things (IoT) are increasingly being used in many facets of our
daily life, which results in an enormous volume of data. Cloud computing and fog computing …

Building an efficient intrusion detection system based on feature selection and ensemble classifier

Y Zhou, G Cheng, S Jiang, M Dai - Computer networks, 2020 - Elsevier
Intrusion detection system (IDS) is one of extensively used techniques in a network topology
to safeguard the integrity and availability of sensitive assets in the protected systems …

An effective feature selection model using hybrid metaheuristic algorithms for iot intrusion detection

SS Kareem, RR Mostafa, FA Hashim, HM El-Bakry - Sensors, 2022 - mdpi.com
The increasing use of Internet of Things (IoT) applications in various aspects of our lives has
created a huge amount of data. IoT applications often require the presence of many …

Performance evaluation of Botnet DDoS attack detection using machine learning

TA Tuan, HV Long, LH Son, R Kumar… - Evolutionary …, 2020 - Springer
Botnet is regarded as one of the most sophisticated vulnerability threats nowadays. A large
portion of network traffic is dominated by Botnets. Botnets are conglomeration of trade PCs …

Scalable machine learning-based intrusion detection system for IoT-enabled smart cities

MA Rahman, AT Asyhari, LS Leong, GB Satrya… - Sustainable Cities and …, 2020 - Elsevier
Given a scale expansion of Internet of Things for sustainable resource management in smart
cities, proper design of an intrusion detection system (IDS) is critical to safeguard the future …

Deep abstraction and weighted feature selection for Wi-Fi impersonation detection

ME Aminanto, R Choi, HC Tanuwidjaja… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
The recent advances in mobile technologies have resulted in Internet of Things (IoT)-
enabled devices becoming more pervasive and integrated into our daily lives. The security …

A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks

H Sedjelmaci, SM Senouci… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) networks have not yet received considerable research
attention. Specifically, security issues are a major concern because such networks, which …

Botnet attack detection in Internet of Things devices over cloud environment via machine learning

M Waqas, K Kumar, AA Laghari… - Concurrency and …, 2022 - Wiley Online Library
With the arrival of the Internet of Things (IoT) many devices such as sensors, nowadays can
communicate with each other and share data easily. However, the IoT paradigm is prone to …