This paper surveys the deep learning (DL) approaches for intrusion-detection systems (IDSs) in Internet of Things (IoT) and the associated datasets toward identifying gaps …
Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over …
The constant miniaturization of hardware and an increase in power efficiency, have made possible the integration of intelligence into ordinary devices. This trend of augmenting so …
Background The Internet of Medical Things (IoMTs) is gradually replacing the traditional healthcare system. However, little attention has been paid to their security requirements in …
A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources …
Fog computing allows the implementation of information processes on the native net, mainly because of its ability to process in real-time. On the other hand, the principles of Mist …
With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing …
Abstract Recently, the Internet of Things (IoT) has been used in technology for different aspects to increase the efficiency and comfort of human life. Protecting the IoT infrastructure …
This paper proposes a method to assess the security of an device, or IP address, IoT network by simultaneously identifying all the compromised IoT devices and IP addresses. It …