Survey: Self-Empowered Wireless Sensor Networks Security Taxonomy, Challenges, and Future Research Directions

M Adil, VG Menon, V Balasubramanian… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
In the recent past, patient-wearable devices and implantable biosensors revealed
exponential growth in digital healthcare, because they have the capability to allow access to …

Windows and IoT malware visualization and classification with deep CNN and Xception CNN using Markov images

O Sharma, A Sharma, A Kalia - Journal of Intelligent Information Systems, 2023 - Springer
Context Technological advances have led to a tremendous increase in complexity and
volume of specialized malware, affecting computational devices across the globe. Along …

Application of industrial Internet of things (IIOT) in crude oil production optimization using pump Efficiency control

AS Allahloh, M Sarfraz, M Alqahtani… - Wireless …, 2022 - Wiley Online Library
The collapse of oil prices in mid‐2014 and early 2016 was the biggest in modern history that
witnessed more than a 70% drop in the price to around $40 barrel. It prompted companies to …

[PDF][PDF] A Novel Approach for Network Vulnerability Analysis in IIoT.

K Sudhakar, S Senthilkumar - Computer Systems Science & …, 2023 - cdn.techscience.cn
Industrial Internet of Things (IIoT) offers efficient communication among business partners
and customers. With an enlargement of IoT tools connected through the internet, the ability …

Using machine learning on testing IoT applications: A systematic mapping

L Freitas, V Lelli - Proceedings of the Brazilian Symposium on …, 2022 - dl.acm.org
Internet of Things (IoT) devices are increasingly present in people's daily lives. Thus has
increased research interest in investigating strategies that can ensure that these …

基于改进遗传算法的物联网链路负载均衡控制方法.

景雯, 张杰, 傅文博, 陈富 - Journal of Jilin University …, 2023 - search.ebscohost.com
针对链路负载控制受物联网搜索空间的影响, 搜索空间过小会降低负载均衡度的问题,
提出一种基于改进遗传算法的物联网链路负载均衡控制方法. 首先, 构建物联网链路的频带传输 …

Deep Feature Extraction Framework Based on DNN for Enhancing Mirai Attachment Classification in Machine Learning

H Gharaibeh, M Aljaidi, A Nasayreh… - … on Electrical, Energy …, 2023 - ieeexplore.ieee.org
Nowadays, the rapid growth of Internet of Things (IoT) devices has changed many parts of
our lives by providing seamless connectivity and automation. However, this expansion has …

[PDF][PDF] A collaborative prediction approach to defend against amplified reflection and exploitation attacks

A Prasad, S Chandra, I Atoum, N Ahmad… - Electronic Research …, 2023 - aimspress.com
An amplified reflection and exploitation-based distributed denial of service (DDoS) attack
allows an attacker to launch a volumetric attack on the target server or network. These …

The State of Cybersecurity in Digital Landscape to Unmask PDF Malware Attacks

A Sharma, H Babbar - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
One of the biggest challenges in cyber security today is detecting malware infections due to
the growing sophistication of cyber threats. Using the CIC-PDFMal2022 dataset, this paper …

Attack Detection in Industrial IoT via Deep Hybrid Model on Solving Class Imbalance Problem

SK Sahoo, BB Behera… - 2024 5th International …, 2024 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) emerged as an acceptable data processing
architecture as several sectors have gone digital. Nevertheless, there are still difficult …