While the emerging 6G networks are anticipated to meet the high-end service quality demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …
Billions of IoT devices lacking proper security mechanisms have been manufactured and deployed for the last years, and more will come with the development of Beyond 5G …
I Cvitić, D Perakovic, BB Gupta… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks remain challenging to mitigate in the existing systems, including in-home networks that comprise different Internet of Things (IoT) devices …
Abstract The number of Cyber-Physical Systems (CPS) available in industrial environments is growing mainly due to the evolution of the Internet-of-Things (IoT) paradigm. In such a …
Publicly available datasets are an indispensable tool for researchers, as they allow testing new algorithms on a wide range of different scenarios and making scientific experiments …
Abstract In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data …
Abstract The application of Deep Neural Networks (DNNs) for monitoring cyberattacks in Internet of Things (IoT) systems has gained significant attention in recent years. However …
Smart home IoT devices lack proper security, raising safety and privacy concerns. One-size- fits-all network administration is ineffective because of the diverse QoS requirements of IoT …
During the last several years, the Internet of Things (IoT), fog computing, computer security, and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …