Challenges and opportunities in securing the industrial internet of things

M Serror, S Hack, M Henze, M Schuba… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… In this context, corrupted products may even cause a higher loss of revenue than a (short-term)
production stop, because a long time may pass until the sabotage is noticed, let alone the …

Structural health monitoring of civil engineering structures by using the internet of things: A review

M Mishra, PB Lourenço, GV Ramana - Journal of Building Engineering, 2022 - Elsevier
… methods to Internet of Things (IoT)-based real-time wireless sensors. Comprehensive
structural health assessment can be performed through the efficient use of real-time test data on …

[HTML][HTML] Internet of things: A general overview between architectures, protocols and applications

M Lombardi, F Pascale, D Santaniello - Information, 2021 - mdpi.com
… Moreover, it will be necessary to find standard protocols to identify objects uniquely. …
objects, preventing cyber-attacks that can undermine the global growth of the Internet of Things. …

[Retracted] A Novel Smart Healthcare Monitoring System Using Machine Learning and the Internet of Things

MB Alazzam, F Alassery… - … and Mobile Computing, 2021 - Wiley Online Library
… : short term, episodic, and long term. Acute stress is characterised by being short and
sharp in duration, … by incorporating these approaches into the Internet of Medical Things (IoMT). …

Artificial intelligence and internet of things enabled disease diagnosis model for smart healthcare systems

RF Mansour, A El Amraoui, I Nouaouri, VG Díaz… - IEEE …, 2021 - ieeexplore.ieee.org
The recent advancements in Internet of Things (IoT), cloud computing, and Artificial
Intelligence (AI) transformed the conventional healthcare system into smart healthcare. By …

[PDF][PDF] Hybrid intrusion detection system for internet of things (IoT)

S Smys, A Basar, H Wang - Journal of ISMAC, 2020 - scholar.archive.org
… and conventional security models requires more time to process such large amount of data
to identify the threats. Unauthorized access to data for short duration of time is sufficient for a …

Botnet attack detection by using CNN‐LSTM model for Internet of things applications

H Alkahtani, THH Aldhyani - Security and Communication …, 2021 - Wiley Online Library
… In this research, we present the convolutional neural network and long short-term memory
(CNN-LSTM) model to detect botnet attacks from selected IoT devices. The proposed system …

Intrusion Detection System to Advance Internet of Things Infrastructure‐Based Deep Learning Algorithms

H Alkahtani, THH Aldhyani - Complexity, 2021 - Wiley Online Library
… example, is to send several packets in a very short time; thus, flow data are ideal for DoS
attack … [19] proposed a hybrid convolution neural network (CNN) with long short-term memory (…

Detecting Internet of Things attacks using distributed deep learning

GDLT Parra, P Rad, KKR Choo, N Beebe - Journal of Network and …, 2020 - Elsevier
… In addition, embeddings from the CNN model are passed to the back-end long-short term
memory based model for detecting distributed attacks as well as botnets. This is the first, if not …

Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future

S Nižetić, P Šolić, DLI Gonzalez-De, L Patrono - Journal of cleaner …, 2020 - Elsevier
… The production of electronic equipment is causing potentially unbalanced waste of
limited metals and resources in general, which could become a critical issue in the long run. …