[HTML][HTML] Cyber resilience and incident response in smart cities: A systematic literature review

G Ahmadi-Assalemi, H Al-Khateeb, G Epiphaniou… - Smart Cities, 2020 - mdpi.com
The world is experiencing a rapid growth of smart cities accelerated by Industry 4.0,
including the Internet of Things (IoT), and enhanced by the application of emerging …

Identifying IoT devices and events based on packet length from encrypted traffic

AJ Pinheiro, JM Bezerra, CAP Burgardt… - Computer …, 2019 - Elsevier
Recently, machine learning algorithms have been used to identify Internet of Things (IoT)
devices and events. However, existing proposals may inspect the packet payload, what …

Budgeted online selection of candidate IoT clients to participate in federated learning

I Mohammed, S Tabatabai, A Al-Fuqaha… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Machine learning (ML), and deep learning (DL) in particular, play a vital role in providing
smart services to the industry. These techniques, however, suffer from privacy and security …

[HTML][HTML] Darknet traffic big-data analysis and network management for real-time automating of the malicious intent detection process by a weight agnostic neural …

K Demertzis, K Tsiknas, D Takezis, C Skianis, L Iliadis - Electronics, 2021 - mdpi.com
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage
legitimate credentials with trusted tools already deployed in a network environment, making …

[HTML][HTML] IoT botnet detection using salp swarm and ant lion hybrid optimization model

R Abu Khurma, I Almomani, I Aljarah - Symmetry, 2021 - mdpi.com
In the last decade, the devices and appliances utilizing the Internet of Things (IoT) have
expanded tremendously, which has led to revolutionary developments in the network …

Vulnerability analysis at industrial internet of things platform on dark web network using computational intelligence

AS Rajawat, R Rawat, K Barhanpurkar… - … intelligent systems and …, 2021 - Springer
Due to the potentially catastrophic effects in the event of an attack, security-enabled design
and algorithms are required to protect automated applications and instruments based on …

A survey of smart home iot device classification using machine learning-based network traffic analysis

H Jmila, G Blanc, MR Shahid, M Lazrag - IEEE Access, 2022 - ieeexplore.ieee.org
Smart home IoT devices lack proper security, raising safety and privacy concerns. One-size-
fits-all network administration is ineffective because of the diverse QoS requirements of IoT …

Darknet traffic analysis and network management for malicious intent detection by neural network frameworks

P William, S Choubey, A Choubey… - … Intelligence for the Dark …, 2022 - igi-global.com
Security breaches may be difficult to detect because attackers are continually tweaking
methods to evade detection and utilize legitimate credentials that have already been …

Multi-objective particle swarm optimization for botnet detection in internet of things

M Habib, I Aljarah, H Faris, S Mirjalili - Evolutionary Machine Learning …, 2020 - Springer
Nowadays, the world witnesses an immense growth in Internet of things devices. Such
devices are found in smart homes, wearable devices, retail, health care, industry, and …

Real-time identification of rogue WiFi connections in the wild

D Yan, Y Yan, P Yang, WZ Song… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
WiFi connections are vulnerable to simulated attacks from rogue access points (APs) or
devices whose SSID and/or MAC/IP address are the same as legitimate devices. This kind of …