Anomaly and intrusion detection using deep learning for software-defined networks: A survey

VG da Silva Ruffo, DMB Lent, M Komarchesqui… - Expert Systems with …, 2024‏ - Elsevier
Abstract Software-Defined Networks (SDN) represent an adaptable paradigm for dealing
with network users' dynamic demands. Confidentiality, integrity, and availability are …

An SDN perspective IoT-Fog security: A survey

S Javanmardi, M Shojafar, R Mohammadi, M Alazab… - Computer Networks, 2023‏ - Elsevier
The utilization of the Internet of Things (IoT) has burst in recent years. Fog computing is a
notion that solves cloud computing's limitations by offering low latency to IoT network user …

Efficient intrusion detection toward IoT networks using cloud–edge collaboration

R Yang, H He, Y Xu, B **n, Y Wang, Y Qu, W Zhang - Computer Networks, 2023‏ - Elsevier
Abstract The Internet of Things (IoT) is increasingly utilized in daily life and industrial
production, particularly in critical infrastructures. IoT cybersecurity has an effect on people's …

[HTML][HTML] DIDS: A Deep Neural Network based real-time Intrusion detection system for IoT

M Vishwakarma, N Kesswani - Decision Analytics Journal, 2022‏ - Elsevier
The number of people using the Internet of Things (IoT) devices has exploded in recent
years. The instantaneous development in deploying constrained devices in numerous areas …

[HTML][HTML] Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things

S Wang, W Xu, Y Liu - Computer Networks, 2023‏ - Elsevier
Abstract The Internet of Things (IoT), as the information carrier of the Internet and
telecommunications networks, is a new network technology comprising physical entities …

Trustworthy Artificial Intelligence Methods for Users' Physical and Environmental Security: A Comprehensive Review

S Szymoniak, F Depta, Ł Karbowiak, M Kubanek - Applied Sciences, 2023‏ - mdpi.com
Artificial Intelligence is an indispensable element of the modern world, constantly evolving
and contributing to the emergence of new technologies. We meet it in everyday applications …

[HTML][HTML] Enhanced threat intelligence framework for advanced cybersecurity resilience

M Alazab, RA Khurma, M García-Arenas… - Egyptian Informatics …, 2024‏ - Elsevier
The increasing severity of cyber-attacks against organizations emphasizes the necessity for
efficient threat intelligence. This article presents a novel multi-layered architecture for threat …

Privacy and Security Best Practices for IoT Solutions

M Anedda, A Floris, R Girau, M Fadda, P Ruiu… - IEEE …, 2023‏ - ieeexplore.ieee.org
The rapid increase in Internet of Things (IoT) applications has raised security and privacy
issues due to the huge amount of data acquired by IoT devices and transmitted through the …

Seagull Optimization-based Feature Selection with Optimal Extreme Learning Machine for Intrusion Detection in Fog Assisted WSN

T Muthu, VK Kalimuthu - Tehnički vjesnik, 2023‏ - hrcak.srce.hr
Sažetak On the internet, various devices that are connected to the Internet of Things (IoT)
and Wireless Sensor Networks (WSNs) share the resources that they have in accordance …

Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review

MA Bouke, A Abdullah, NI Udzir… - Journal of Communication …, 2024‏ - jcis.sbrt.org.br
Abstract The Internet of Things (IoT) and cloud computing are rapidly gaining momentum as
decentralized internet-based technologies and have led to an increase in information in …