LR Parker, PD Yoo, TA Asyhari, L Chermak… - Proceedings of the 14th …, 2019 - dl.acm.org
Recent studies have proposed that traditional security technology--involving pattern- matching algorithms that check predefined pattern sets of intrusion signatures--should be …
Over the last decade, Internet of Things (IoT) has permeated our daily life with a broad range of applications. However, a lack of sufficient security features in IoT devices renders IoT …
Intrusion detection systems (IDSs) that continuously monitor data flow and take swift action when attacks are identified safeguard networks. Conventional IDS exhibit limitations, such …
Abstract The Internet of Things (IoT) is currently seeing tremendous growth due to new technologies and big data. Research in the field of IoT security is an emerging topic. IoT …
OA Alkhudaydi, M Krichen, AD Alghamdi - Information, 2023 - mdpi.com
With the increasing severity and frequency of cyberattacks, the rapid expansion of smart objects intensifies cybersecurity threats. The vast communication traffic data between …
Abstract Internet of Things (IoTs) has been playing an important role in many sectors, such as smart cities, smart agriculture, smart healthcare, and smart manufacturing. However, IoT …
The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As a …
Owing to the prevalence of the Internet of things (IoT) devices connected to the Internet, the number of IoT-based attacks has been growing yearly. The existing solutions may not …
B Jothi, M Pushpalatha - Personal and Ubiquitous Computing, 2023 - Springer
Abstract Internet of Things (IoT) and its applications have gained importance in recent times of research. The heterogeneous nature of IoT networks makes them applicable for various …