[HTML][HTML] Deep learning for cyber threat detection in IoT networks: A review

A Aldhaheri, F Alwahedi, MA Ferrag, A Battah - Internet of Things and cyber …, 2024 - Elsevier
Abstract The Internet of Things (IoT) has revolutionized modern tech with interconnected
smart devices. While these innovations offer unprecedented opportunities, they also …

A comprehensive survey on machine learning‐based intrusion detection systems for secure communication in internet of things

SVN Santhosh Kumar, M Selvi… - Computational …, 2023 - Wiley Online Library
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …

The limitations of federated learning in sybil settings

C Fung, CJM Yoon, I Beschastnikh - 23rd International Symposium on …, 2020 - usenix.org
Federated learning over distributed multi-party data is an emerging paradigm that iteratively
aggregates updates from a group of devices to train a globally shared model. Relying on a …

A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications

J Lin, W Yu, N Zhang, X Yang… - IEEE internet of things …, 2017 - ieeexplore.ieee.org
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to
enable computing services devices deployed at network edge, aiming to improve the user's …

Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities

N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
The fifth generation (5G) wireless technologies serve as a key propellent to meet the
increasing demands of the future Internet of Things (IoT) networks. For wireless …

[HTML][HTML] Cybersecurity challenges in vehicular communications

Z El-Rewini, K Sadatsharan, DF Selvaraj… - Vehicular …, 2020 - Elsevier
As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-
Everything (V2X) communication technologies mature, the necessity to secure …

Sok: Sharding on blockchain

G Wang, ZJ Shi, M Nixon, S Han - … of the 1st ACM Conference on …, 2019 - dl.acm.org
Blockchain is a distributed and decentralized ledger for recording transactions. It is
maintained and shared among the participating nodes by utilizing cryptographic primitives …

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

A secure sharding protocol for open blockchains

L Luu, V Narayanan, C Zheng, K Baweja… - Proceedings of the …, 2016 - dl.acm.org
Cryptocurrencies, such as Bitcoin and 250 similar alt-coins, embody at their core a
blockchain protocol---a mechanism for a distributed network of computational nodes to …

Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …