SOAR4IoT: securing IoT assets with digital twins

P Empl, D Schlette, D Zupfer, G Pernul - Proceedings of the 17th …, 2022 - dl.acm.org
As more and more security tools provide organizations with cybersecurity capabilities,
security analysts are overwhelmed by security events. Resolving these events is challenging …

IVQFIoT: An intelligent vulnerability quantification framework for scoring internet of things vulnerabilities

P Anand, Y Singh, A Selwal, PK Singh… - Expert …, 2022 - Wiley Online Library
With time smart services have become more domineering than ever before however, the
pertinent security considerations fade to correspond with growing heterogeneity in the …

Federated learning based privacy ensured sensor communication in IoT networks: a taxonomy, threats and attacks

SI Manzoor, S Jain, Y Singh, H Singh - IEEE Access, 2023 - ieeexplore.ieee.org
Our daily lives are significantly impacted by intelligent Internet of Things (IoT) application,
services, IoT gadgets, and more intelligent industries. Artificial Intelligence (AI) is anticipated …

Blockchain-Integrated Security for real-time patient monitoring in the Internet of Medical Things using Federated Learning

MF Khan, M AbaOud - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) heralds a transformative era in healthcare, with the
potential to revolutionize patient care, healthcare services, and medical research. As with all …

Securing IoT devices against emerging security threats: challenges and mitigation techniques

M Aziz Al Kabir, W Elmedany… - Journal of Cyber Security …, 2023 - Taylor & Francis
The increasing prevalence of IoT devices has brought about numerous security challenges
due to their relatively simple internal architecture and low-powered hardware warranted by …

Internet of Things and healthcare system: A systematic review of ethical issues

S Zakerabasali, SM Ayyoubzadeh - Health Science Reports, 2022 - Wiley Online Library
Abstract Background and Aims The Internet of Things (IoTs) is a set of connected objects
and devices that share data and pursue a common goal in different areas. IoT technology …

An optimization model for appraising intrusion-detection systems for network security communications: Applications, challenges, and solutions

M Abdel-Basset, A Gamal, KM Sallam, I Elgendi… - Sensors, 2022 - mdpi.com
Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of
intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The …

A Critical Overview of Industrial Internet of Things Security and Privacy Issues Using a Layer-Based Hacking Scenario

AH Eyeleko, T Feng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
We have witnessed significant technological advancement over the past few years,
including the Internet of Things (IoT). The IoT's ability to connect consumer appliances to the …

Deep learning for resource management in Internet of Things networks: a bibliometric analysis and comprehensive review

SO Olatinwo, TH Joubert - IEEE Access, 2022 - ieeexplore.ieee.org
In this study, we conducted a bibliometric analysis and comprehensive review of the studies
published between the period of 2012 and 2022 on resource management in internet of …

Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends

SH Rafique, A Abdallah, NS Musa, T Murugan - Sensors, 2024 - mdpi.com
With its exponential growth, the Internet of Things (IoT) has produced unprecedented levels
of connectivity and data. Anomaly detection is a security feature that identifies instances in …