A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

Error prevalence in nids datasets: A case study on cic-ids-2017 and cse-cic-ids-2018

L Liu, G Engelen, T Lynar, D Essam… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Benchmark datasets are heavily depended upon by the research community to validate
theoretical findings and track progression in the state-of-the-art. NIDS dataset creation …

Machine learning for the detection and identification of Internet of Things devices: A survey

Y Liu, J Wang, J Li, S Niu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming an indispensable part of everyday life, enabling a
variety of emerging services and applications. However, the presence of rogue IoT devices …

IoT network traffic classification using machine learning algorithms: An experimental analysis

R Kumar, M Swarnkar, G Singal… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) refers to a wide variety of embedded devices connected to the
Internet, enabling them to transmit and share information in smart environments with each …

Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

A survey of smart home iot device classification using machine learning-based network traffic analysis

H Jmila, G Blanc, MR Shahid, M Lazrag - IEEE Access, 2022 - ieeexplore.ieee.org
Smart home IoT devices lack proper security, raising safety and privacy concerns. One-size-
fits-all network administration is ineffective because of the diverse QoS requirements of IoT …

Optimal witnessing of healthcare IoT data using blockchain logging contract

MH Chinaei, HH Gharakheili… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Verification of data generated by wearable sensors is increasingly becoming of concern to
health service providers and insurance companies. These devices are typically vulnerable …

An opportunistic energy‐efficient dynamic self‐configuration clustering algorithm in WSN‐based IoT networks

S Tumula, Y Ramadevi, E Padmalatha… - International Journal …, 2024 - Wiley Online Library
The demand for the Internet of Things (IoT) has significantly increased in the current
scenario; specific sectors that require IoT include industrial automation, home control, health …

A survey of iot privacy security: Architecture, technology, challenges, and trends

P Sun, S Shen, Y Wan, Z Wu, Z Fang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control
and report environmental changes, prevent fires, and perform many more beneficial …

Cybersecurity analysis of wearable devices: smartwatches passive attack

AG Silva-Trujillo, MJ González González… - Sensors, 2023 - mdpi.com
Wearable devices are starting to gain popularity, which means that a large portion of the
population is starting to acquire these products. This kind of technology comes with a lot of …