Analysis of cyber security attacks and its solutions for the smart grid using machine learning and blockchain methods

T Mazhar, HM Irfan, S Khan, I Haq, I Ullah, M Iqbal… - Future Internet, 2023 - mdpi.com
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid
has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the …

Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope

ZA Sheikh, Y Singh, PK Singh, KZ Ghafoor - Computer Communications, 2022 - Elsevier
Abstract Cyber–Physical Systems (CPS) are developed by the integration of computational
algorithms and physical components and they exist as a result of technological …

[PDF][PDF] Survey on Deep Learning Approaches for Detection of Email Security Threat.

MM Saeed, Z Al Aghbari - Computers, Materials & Continua, 2023 - cdn.techscience.cn
Emailing is among the cheapest and most easily accessible platforms, and covers every
idea of the present century like banking, personal login database, academic information …

Energy-efficient network routing protocols for IoT applications

D Devassy, IJ Jebadurai, GJL Paulraj, S Silas… - … Communication for 5G …, 2022 - Springer
Abstract The Internet of Things (IoT) connects various devices via sensors, actuators, and
processors to the network that can exchange information rapidly. These devices generate …

Trustworthy machine learning for cloud-based internet of things (IoT)

S Yadav, RC Joshi, D Yadav - Transforming Management with AI, Big-Data …, 2022 - Springer
With the rise of new technology, the Internet of Things (IoT) undertakes a dynamic and
central role in healthcare, smart homes, retail analytics, agricultural machinery, etc. Cloud …

Adaptive multimode decision tree classification model using effective system analysis in ids for 5g and iot security issues

PT Kalaivaani, R Krishnamoorthy, AS Reddy… - … Communication for 5G …, 2022 - Springer
All networks dramatically replace everyday life with features of human society. In network
authentication, when compatibility and assistance occur at an equal time, the network suffers …

Evaluating Machine Learning Methods for Intrusion Detection in IoT

M Nicho, S Girija - Proceedings of the 12th International Conference on …, 2022 - dl.acm.org
Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the
Covid-19 pandemic due to cyber physical digital transformation enabled through …

A detection of IoT based IDS attacks using deep neural network

S Sarika, S Velliangiri, M Ravi - AIP Conference Proceedings, 2021 - pubs.aip.org
The aim of the Internet-of-Things (IoT) is to seamlessly interconnect thousands or millions of
physical sensors/devices by monitoring, analyzing and evaluating massive amounts of data …

Learning Approaches for Security and Privacy in Internet of Things

T Daniya, M Geetha, V Sarveshwaran… - Modern Approaches in IoT …, 2023 - Springer
Abstract The Internet of Things (IoT) is an evolving pattern that concentrates on the links
between machine,“things,” the internet, and users. One of the core technologies to achieve …

Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things

AK Demir, S Alam - … of Research on Advancing Cybersecurity for …, 2021 - igi-global.com
Internet of things (IoT) has revolutionized digital transformation and is present in every sector
including transportation, energy, retail, healthcare, agriculture, etc. While stepping into the …