A Linux Audit and MQTT-based Security Monitoring Framework

J Yin, Y Ishikawa, A Takefusa - 2023 IEEE 47th Annual …, 2023 - ieeexplore.ieee.org
Along with the significant growth in the number of connected Internet of Things (IoT) devices
and increasingly aggressive cyberattacks, IoT cybersecurity has been facing more and more …

Anomaly Detection for IoT Security: Comprehensive Survey

AA Rokhade, AS Vithapnavar, S Amruth… - … on Advances in …, 2023 - ieeexplore.ieee.org
The increasing adoption of the Internet of Things (IoT) technology in various fields like smart
home appliances, smart grids, health care systems etc., is transforming the way we live and …

Evaluating the role of reference architectures in designing low-cost digital manufacturing systems

J Kaiser - 2024 - repository.cam.ac.uk
A low-cost digital manufacturing system is a special type of digital system, that consists of a
combination of low-cost components and meets entry-level digitalisation needs of small and …

Efficient Encryption using Quondam Signature Algorithm and Modified Lean Six Sigma for Sustainability with Supply Chain Management

FB Kunwar, H Singh, RK Yadav - 2024 - researchsquare.com
This paper presents a novel blockchain-based Industrial Internet of Things (IIIoT) security
approach. The proposed architecture uses an eco-friendly federated learning AI-driven …

Mobile Firewall System for Distributed Denial of Service Defense in Internet of Things Networks

L Gardea - 2023 - search.proquest.com
Abstract Internet of Things (IoT) has seen unprecedented growth in the consumer space
over the past ten years. The majority of IoT device manufacturers do not, however, build their …

A Lightweight Malicious Traffic Identification Method Based on a Simplified Hybrid Vision Transformer Model

W Zhang, Y Feng, H Zhu, W Liang - Available at SSRN 4791447 - papers.ssrn.com
Aiming to meet the requirements of the Internet of Things (IoT) for high accuracy and
lightweight malicious traffic identification methods, this paper proposes a grayscale image …

[引用][C] Security modelling and analysis of Internet of Things against evolving attacks

KO Chee - 2024 - espace.library.uq.edu.au
The growing and booming market of Internet of Things (IoT) devices in the recent decade
has attracted attackers from everywhere and provided these attackers with limitless but easy …