A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …

Machine learning algorithms for wireless sensor networks: A survey

DP Kumar, T Amgoth, CSR Annavarapu - Information Fusion, 2019 - Elsevier
Wireless sensor network (WSN) is one of the most promising technologies for some real-
time applications because of its size, cost-effective and easily deployable nature. Due to …

An improved deep reinforcement learning routing technique for collision-free VANET

P Upadhyay, V Marriboina, SJ Goyal, S Kumar… - Scientific Reports, 2023 - nature.com
Abstract Vehicular Adhoc Networks (VANETs) is an emerging field that employs a wireless
local area network (WLAN) characterized by an ad-hoc topology. Vehicular Ad Hoc …

Design of secure and lightweight authentication protocol for wearable devices environment

AK Das, M Wazid, N Kumar, MK Khan… - IEEE journal of …, 2017 - ieeexplore.ieee.org
Wearable devices are used in various applications to collect information including step
information, slee** cycles, workout statistics, and health-related information. Due to the …

Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments

W Li, W Meng, MH Au - Journal of Network and Computer Applications, 2020 - Elsevier
Collaborative intrusion detection systems (CIDSs) are develo** to improve the detection
performance of a single detector in Internet of Things (IoT) networks, through exchanging …

Enhancing medical smartphone networks via blockchain-based trust management against insider attacks

W Meng, W Li, L Zhu - IEEE Transactions on Engineering …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has gradually become one of the most important platforms across
different disciplines, by enabling dedicated physical objects to communicate with other …

Designing collaborative blockchained signature-based intrusion detection in IoT environments

W Li, S Tug, W Meng, Y Wang - Future Generation Computer Systems, 2019 - Elsevier
With the rapid development of Internet-of-Things (IoT), there is an increasing demand for
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …

A survey on blockchain-based IoMT systems: Towards scalability

AA Jolfaei, SF Aghili, D Singelee - Ieee Access, 2021 - ieeexplore.ieee.org
Recently, blockchain-based Internet of Medical Things (IoMT) has started to receive more
attention in the healthcare domain as it not only improves the care quality using real-time …

A new enhanced cyber security framework for medical cyber physical systems

I Priyadarshini, R Kumar, LM Tuan, LH Son… - SICS Software-Intensive …, 2021 - Springer
Abstract Medical Cyber-Physical Systems (MCPS) are complex, location-aware, networked
systems of medical devices that can be used as a piece of the healing center to give the best …