[HTML][HTML] A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …

[HTML][HTML] Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection

M Schmitt - Journal of Industrial Information Integration, 2023 - Elsevier
The last decades have been characterized by unprecedented technological advances,
many of them powered by modern technologies such as Artificial Intelligence (AI) and …

[HTML][HTML] Securing smart healthcare cyber-physical systems against blackhole and greyhole attacks using a blockchain-enabled gini index framework

M Javed, N Tariq, M Ashraf, FA Khan, M Asim, M Imran - Sensors, 2023 - mdpi.com
The increasing reliance on cyber-physical systems (CPSs) in critical domains such as
healthcare, smart grids, and intelligent transportation systems necessitates robust security …

Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

N Alfriehat, M Anbar, S Karuppayah, SDA Rihan… - IEEE …, 2024 - ieeexplore.ieee.org
The internet of things (IoT) is an emerging technological advancement with significant
implications. It connects a wireless sensor or node network via low-power and lossy …

Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks

S Rajasoundaran, SVNS Kumar, M Selvi… - Wireless …, 2024 - Springer
Abstract Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit
the data through water medium and monitor the oceanic conditions, water contents, under …

An intelligent RPL attack detection using machine learning-based intrusion detection system for Internet of Things

T Raghavendra, M Anand, M Selvi… - Procedia Computer …, 2022 - Elsevier
Abstract The Internet of Things (IoT) is an important and a major key component to support
human life. Sensors are the sensing devices that play an important role in IoT to detect …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

Evaluation of predicted fault tolerance based on C5. 0 decision tree algorithm in irrigation system of paddy fields

M Rahi, A Ebrahimnejad, H Motameni - International Journal of …, 2024 - emerald.com
Purpose Taking into consideration the current human need for agricultural produce such as
rice that requires water for growth, the optimal consumption of this valuable liquid is …

[HTML][HTML] Automatic failure recovery for container-based iot edge applications

K Olorunnife, K Lee, J Kua - Electronics, 2021 - mdpi.com
Recent years have seen the rapid adoption of Internet of Things (IoT) technologies, where
billions of physical devices are interconnected to provide data sensing, computing and …

Optimization of network topology robustness in IoTs: A systematic review

SA Changazi, AD Bakhshi, M Yousaf, SM Mohsin… - Computer Networks, 2024 - Elsevier
Abstract Internet of Things (IoT) has emerged as one of the most promising technologies of
the modern era, enabling connectivity between devices and systems for efficient data …