Deep learning for resource management in Internet of Things networks: a bibliometric analysis and comprehensive review

SO Olatinwo, TH Joubert - IEEE Access, 2022 - ieeexplore.ieee.org
In this study, we conducted a bibliometric analysis and comprehensive review of the studies
published between the period of 2012 and 2022 on resource management in internet of …

[HTML][HTML] A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem

A Nazir, J He, N Zhu, SS Qureshi, SU Qureshi… - Ain Shams Engineering …, 2024 - Elsevier
Abstract The Internet of Things (IoT) landscape is witnessing rapid growth, driven by
continuous innovation and a simultaneous increase in cybersecurity threats. As these …

EIDDM: Edge and internet layer distributed dos threats detection and mitigation for internet of things wireless communications

K Kumavat, J Gomes - Wireless Personal Communications, 2023 - Springer
Abstract Distributed Denial of Service (DDoS) attacks, plague the Internet of Things (IoT)-
enabled distributed communication network. To mitigate DDoS attacks on IoT many …

[HTML][HTML] Augmented reality smart glasses use and acceptance: Α literature review

G Koutromanos, G Kazakou - Computers & Education: X Reality, 2023 - Elsevier
The research interest in the use of augmented reality smart glasses (ARSGs) has increased
dramatically in recent years as they are utilised in many fields such as medicine and …

Decision tree based data pruning with the estimation of oversampling attributes for the secure communication in IOT

N Mohamed, A Awasthi, N Kulkarni, S Thota… - International Journal of …, 2022 - ijisae.org
Abstract Internet of Things (IoT) exhibits a significant role to evaluate the error or supply
shortage. The IoT demand for the security and authentication of the devices is considered as …

A Deep Learning Approach for Securing IoT Infrastructure with Emphasis on Smart Vertical Networks

M Kolhar, SM Aldossary - Designs, 2023 - mdpi.com
As a result of the Internet of Things (IoT), smart city infrastructure has been able to advance,
enhancing efficiency and enabling remote management. Despite this, this interconnectivity …

Detection of Hello Flood Attacks Using Fuzzy-Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

S Radhika, K Anitha, C Kavitha, WC Lai, SR Srividhya - Electronics, 2022 - mdpi.com
Clustering is one among the most important strategies to improve the lifetime of wireless
sensor networks (WSNs). The frequent occurrence of clustering and the subsequent …

A novel software architecture solution with a focus on long-term IoT device security support

I Dodig, D Cafuta, T Kramberger, I Cesar - Applied Sciences, 2021 - mdpi.com
This paper presents a solution for upgrading a previous device model to an Industry 4.0
smart device, with the goal of maintaining high compatibility. A novel IoT architecture is …

A lightweight messaging protocol for internet of things devices

JO Agyemang, JJ Kponyo, JD Gadze… - Technologies, 2022 - mdpi.com
The move towards intelligent systems has led to the evolution of IoT. This technological leap
has over the past few years introduced significant improvements to various aspects of the …

Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future

SF Ahmed, S Shuravi, A Bhuyian, S Afrin… - arXiv preprint arXiv …, 2023 - arxiv.org
Given the exponential expansion of the internet, the possibilities of security attacks and
cybercrimes have increased accordingly. However, poorly implemented security …