A Jyotsna, EA Mary Anita - International Conference on Computer and …, 2023 - Springer
Abstract The Internet of Things (IoT) has revolutionized the way we interact with technology by connecting everyday devices to the internet. However, this increased connectivity also …
TA Mohamed, T Otsuka, T Ito - Recent Trends and Future Technology in …, 2018 - Springer
IoT Security is one of the most critical issues when developing, implementing and deploying IoT platforms. IoT refers to the ability of communication, monitoring and remote control of …
AR Abdulla, NGM Jameel - UHD Journal of Science and …, 2023 - journals.uhd.edu.iq
Physical objects that may communicate with one another are referred to “things” throughout the Internet of Things (IoT) concept. It introduces a variety of services and activities that are …
IoT adoption is becoming widespread in different areas of applications in our daily lives. The increased reliance on IoT devices has made them a worthy target for attackers. With …
YG Kim, KJ Ahmed, MJ Lee, K Tsukamoto - International Conference on …, 2022 - Springer
With the proliferation of IoT devices, securing the IoT-based network is of paramount importance. IoT-based networks consist of diversely purposed IoT devices. This diversity of …
The vast expansion of the Internet of Things (IoT) exposes it to the threat of massive financial and reputational harm. The imperative to develop an emergency action plan and …
B Xu, L Sun, X Mao, R Ding, C Liu - Electronics, 2023 - mdpi.com
With the rapid development of the Internet of Things (IoT), the number of IoT devices is increasing dramatically, making it increasingly important to identify intrusions on these …
Abstract The Internet of Things (IoT) and machine learning (ML) have various applications in different sectors of life, such as healthcare, agriculture, industries, transportation, smart …
S Aftab, ZS Shah, SA Memon… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) is rapidly expanding in the industrial sector, and it is critical to ensure the security of IIoT systems against cyber threats. This paper proposes an intrusion …