IOT device type identification using magnetized Hopfield neural network with tuna swarm optimization algorithm

A Muthukrishnan, S Kamalesh - Swarm and Evolutionary Computation, 2024 - Elsevier
Abstract Internet of Things (IoT) networks consist of physical devices connected to the
Internet, embedded with actuators, sensors, and communication components that exchange …

On feature selection algorithms for effective botnet detection

M Afroz, M Ibnath, A Rahman, J Sultana… - Journal of Network and …, 2024 - Springer
The threats of botnets are becoming a growing concern infecting more and more computers
every day. Although botnets can be detected from their behavioral patterns, it is becoming …

Enhancing Identification of IoT Anomalies in Smart Homes Using Secure Blockchain Technology

S Tahir - Cybersecurity Measures for Logistics Industry …, 2024 - igi-global.com
Numerous technologies that automate processes and simplify our lives are included in smart
homes. These gadgets may be helpful for various things, including temperature, lighting …

Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning

E Safeer, S Tahir, A Nawaz, M Humayun… - Security and …, 2024 - Wiley Online Library
Abstract The Internet of Things (IoT) effortlessly enables communication between items on
the World Wide Web and other systems. This extensive use of IoTs has created new services …

Botnet Detection Using Label Propagation and Batch K-means Clustering for Securing IoT Networks

M Almiani, A AbuGhazleh, A Mughaid… - … Conference on Fog …, 2023 - ieeexplore.ieee.org
A profound devastation is experienced when privacy is violated, and personal information is
compromised or lost. Now, consider the situation where all these penetrations occur …

Improving Network Security using Tunicate Swarm Algorithm with Stacked Deep Learning Model on IoT Environment

AZ Abualkishik, R Almajed - Full Length Article, 2024 - americaspg.com
Abstract The Internet of Things (IoT) represents important security vulnerabilities, increasing
difficulties in cyberattacks. Attackers employ these vulnerabilities to establish distributed …

IoT Security: A Deep Learning-Based Approach for Intrusion Detection and Prevention

B Kauhsik, H Nandanwar… - … Algorithms and Soft …, 2023 - ieeexplore.ieee.org
The size and market worth of the Internet of Things (IoT) have expanded, but unfortunately,
the likelihood of user data being compromised has also risen. This presents a notable …

Comparative Analysis of Data Balancing Methods for the Optimization of Botnet Attack Detection Models

AR Wijaya, T Ahmad, DP Hostiadi… - … on Smart Computing …, 2024 - ieeexplore.ieee.org
In the era of widespread Internet connectivity, botnet threats pose an increasingly significant
risk to network security. One way to deal with the risk of botnet threats is to build a reliable …

Botnet activity spotting with artificial intelligence: efficient bot malware detection and social bot identification

J Velasco Mata - 2023 - buleria.unileon.es
[EN] In the cybercrime scope, botnets are networks of bots, automated entities that follow
instructions from a cybercriminal. The capacity of these networks to operate en masse has …