Efficiency enhancement of intrusion detection in iot based on machine learning through bioinspire

R Samdekar, SM Ghosh… - 2021 Third International …, 2021 - ieeexplore.ieee.org
The Internet of Things of the future will also have a profound technological, business, and
social impact on society. In IoT environments, networking devices are typically resource …

A state of the art survey of machine learning algorithms for IoT security

AF Jahwar, SRM Zeebaree - Asian Journal of …, 2021 - science.scholarsacademic.com
The Internet of Things (IoT) is a paradigm shift that enables billions of devices to connect to
the Internet. The IoT's diverse application domains, including smart cities, smart homes, and …

Reinforcement-Learning-based IDS for 6LoWPAN

AM Pasikhani, JA Clark, P Gope - 2021 IEEE 20th International …, 2021 - ieeexplore.ieee.org
The Routing Protocol for low power Lossy networks (RPL) is a critical operational
component of low power wireless personal area networks using IPv6 (6LoWPANs). In this …

An enhanced CoAP scheme using fuzzy logic with adaptive timeout for IoT congestion control

P Aimtongkham, P Horkaew, C So-In - IEEE Access, 2021 - ieeexplore.ieee.org
Congestion management in the Internet of Things (IoT) is one of the most challenging tasks
in improving the quality of service (QoS) of a network. This is largely because modern …

A deep learning-based penetration testing framework for vulnerability identification in internet of things environments

N Koroniotis, N Moustafa, B Turnbull… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) paradigm has displayed tremendous growth in recent years,
resulting in innovations like Industry 4.0 and smart environments that provide improvements …

Vulnerabilities of Internet of Things, for Healthcare Devices and Applications

K Tsantikidou, N Sklavos - 2021 8th NAFOSTED Conference on …, 2021 - ieeexplore.ieee.org
As the Internet of Things (IoT) is progressively integrated into people's life, the security
aspect of Healthcare applications is drastically becoming a major concern for the research …

Adversarial attacks on featureless deep learning malicious urls detection

B Rasheed, A Khan, SMA Kazmi… - Computers …, 2021 - research-information.bris.ac.uk
Abstract Detecting malicious Uniform Resource Locators (URLs) is crucially important to
prevent attackers from committing cybercrimes. Recent researches have investigated the …

[PDF][PDF] ur Rehman

A Churcher, R Ullah, J Ahmad - Networks, 2021 - researchgate.net
In recent years, there has been a massive increase in the amount of Internet of Things (IoT)
devices as well as the data generated by such devices. The participating devices in IoT …

Deep-learning-assisted wireless-powered secure communications with imperfect channel state information

W Lee, K Lee, TQS Quek - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In this article, we consider a practical scenario for secure wireless-powered communication
in the presence of imperfect channel state information (CSI) with simultaneous energy …

A survey on learning-based intrusion detection systems for IoT networks

S Abdelhamid, M Aref, I Hegazy… - 2021 Tenth …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) networks have developed tremendously over the past years. The
main concept behind this technology is to facilitate information exchange between devices …