Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review

M Abdullahi, Y Baashar, H Alhussian, A Alwadain… - Electronics, 2022 - mdpi.com
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …

Internet of medical things privacy and security: Challenges, solutions, and future trends from a new perspective

F Kamalov, B Pourghebleh, M Gheisari, Y Liu… - Sustainability, 2023 - mdpi.com
The Internet of Medical Things (IoMT), an application of the Internet of Things (IoT) in the
medical domain, allows data to be transmitted across communication networks. In particular …

A survey on deep learning tools dealing with data scarcity: definitions, challenges, solutions, tips, and applications

L Alzubaidi, J Bai, A Al-Sabaawi, J Santamaría… - Journal of Big Data, 2023 - Springer
Data scarcity is a major challenge when training deep learning (DL) models. DL demands a
large amount of data to achieve exceptional performance. Unfortunately, many applications …

[HTML][HTML] A hybrid CNN+ LSTM-based intrusion detection system for industrial IoT networks

HC Altunay, Z Albayrak - … Science and Technology, an International Journal, 2023 - Elsevier
Abstract The Internet of Things (IoT) ecosystem has proliferated based on the use of the
internet and cloud-based technologies in the industrial area. IoT technology used in the …

Internet of things (IoT) security dataset evolution: Challenges and future directions

B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P Xiong… - Internet of Things, 2023 - Elsevier
The evolution of mobile technologies has introduced smarter and more connected objects
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …

Intrusion detection system using feature extraction with machine learning algorithms in IoT

D Musleh, M Alotaibi, F Alhaidari, A Rahman… - Journal of Sensor and …, 2023 - mdpi.com
With the continuous increase in Internet of Things (IoT) device usage, more interest has
been shown in internet security, specifically focusing on protecting these vulnerable devices …

Deepfake detection using deep learning methods: A systematic and comprehensive review

A Heidari, N Jafari Navimipour, H Dag… - … Reviews: Data Mining …, 2024 - Wiley Online Library
Deep Learning (DL) has been effectively utilized in various complicated challenges in
healthcare, industry, and academia for various purposes, including thyroid diagnosis, lung …

Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework

M Al Razib, D Javeed, MT Khan, R Alkanhel… - IEEE …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is an instantly exacerbated communication technology that is
manifesting miraculous effectuation to revolutionize conventional means of network …

Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure

A Djenna, S Harous, DE Saidouni - Applied Sciences, 2021 - mdpi.com
As a new area of technology, the Internet of Things (IoT) is a flagship and promising
paradigm for innovating society. However, IoT-based critical infrastructures are an appealing …

A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …