A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …
cybersecurity. This phenomenon indicates that threats require special detection systems …
Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …
necessity to help safeguard personal and organizational assets. However, with the …
Machine learning algorithms for wireless sensor networks: A survey
Wireless sensor network (WSN) is one of the most promising technologies for some real-
time applications because of its size, cost-effective and easily deployable nature. Due to …
time applications because of its size, cost-effective and easily deployable nature. Due to …
An improved deep reinforcement learning routing technique for collision-free VANET
Abstract Vehicular Adhoc Networks (VANETs) is an emerging field that employs a wireless
local area network (WLAN) characterized by an ad-hoc topology. Vehicular Ad Hoc …
local area network (WLAN) characterized by an ad-hoc topology. Vehicular Ad Hoc …
Design of secure and lightweight authentication protocol for wearable devices environment
Wearable devices are used in various applications to collect information including step
information, slee** cycles, workout statistics, and health-related information. Due to the …
information, slee** cycles, workout statistics, and health-related information. Due to the …
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments
Collaborative intrusion detection systems (CIDSs) are develo** to improve the detection
performance of a single detector in Internet of Things (IoT) networks, through exchanging …
performance of a single detector in Internet of Things (IoT) networks, through exchanging …
Enhancing medical smartphone networks via blockchain-based trust management against insider attacks
Internet of Things (IoT) has gradually become one of the most important platforms across
different disciplines, by enabling dedicated physical objects to communicate with other …
different disciplines, by enabling dedicated physical objects to communicate with other …
Designing collaborative blockchained signature-based intrusion detection in IoT environments
With the rapid development of Internet-of-Things (IoT), there is an increasing demand for
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …
A survey on blockchain-based IoMT systems: Towards scalability
Recently, blockchain-based Internet of Medical Things (IoMT) has started to receive more
attention in the healthcare domain as it not only improves the care quality using real-time …
attention in the healthcare domain as it not only improves the care quality using real-time …
A new enhanced cyber security framework for medical cyber physical systems
Abstract Medical Cyber-Physical Systems (MCPS) are complex, location-aware, networked
systems of medical devices that can be used as a piece of the healing center to give the best …
systems of medical devices that can be used as a piece of the healing center to give the best …