Botnet detection in the internet of things using deep learning approaches

CD McDermott, F Majdani… - 2018 international joint …, 2018 - ieeexplore.ieee.org
The recent growth of the Internet of Things (IoT) has resulted in a rise in IoT based DDoS
attacks. This paper presents a solution to the detection of botnet activity within consumer IoT …

Wireless technologies, medical applications and future challenges in WBAN: A survey

H Taleb, A Nasser, G Andrieux, N Charara… - Wireless …, 2021 - Springer
Interest and need for Wireless Body Area Networks (WBANs) have significantly increased
recently. WBAN consists of miniaturized sensors designed to collect and transmit data …

A security analysis method for industrial Internet of Things

H Mouratidis, V Diamantopoulou - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The industrial Internet of Things (IIoT) provide an opportunity for industries to build large
interconnected systems that utilize various technologies, such as personal computers …

[PDF][PDF] A Review on Privacy Preservation of Location-Based Services in Internet of Things.

R Wazirali - Intelligent Automation & Soft Computing, 2022 - academia.edu
Internet of Things (IoT) has become popular with the rapid development of sensing devices,
and it offers a large number of services. Location data is one of the most important …

IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN

M Ingham, J Marchang, D Bhowmik - IET information security, 2020 - Wiley Online Library
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse
applicability and ease of deployment. However, the issues related to security are less …

Secure Three‐Factor Anonymous User Authentication Scheme for Cloud Computing Environment

H Lee, D Kang, Y Lee, D Won - Wireless Communications and …, 2021 - Wiley Online Library
Cloud computing provides virtualized information technology (IT) resources to ensure the
workflow desired by user at any time and location; it allows users to borrow computing …

Evaluating awareness and perception of botnet activity within consumer internet-of-things (IoT) networks

CD McDermott, JP Isaacs, AV Petrovski - Informatics, 2019 - mdpi.com
The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices,
has led to the production of swathes of insecure Internet-connected devices. Many can be …

Intrusion detection for IoT network security with deep neural network

M Ahsan, N Rifat, M Chowdhury… - 2022 IEEE international …, 2022 - ieeexplore.ieee.org
The number of Internet of Things devices are increasing as we are demanding more smart
devices over time. These devices are well known for having weaker security measures …

Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

S Pandey, B Bhushan - Wireless Networks, 2024 - Springer
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …

Internet of things security

J Dazine, A MAIZATE… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
IOT devices are emerging technologies used to interconnect devices and people to the
internet. IOT security issues have very bad consequences which makes IOT devices …