5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled …
Z Wang, J Tian, H Fang, L Chen, J Qin - Computer Networks, 2022 - Elsevier
Log anomaly detection on edge devices is the key to enhance edge security when deploying IoT systems. Despite the success of many newly proposed deep learning based …
5G is becoming the foundation for the Industrial Internet of Things (IIoT) enabling more effective low-latency integration of artificial intelligence and cloud computing in a framework …
S Madan, S Sofat, D Bansal - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT devices which include wireless sensors, software, actuators, and computer devices operated through the Internet, enable the transfer of data among objects or people …
S Alosaimi, SM Almutairi - Applied Sciences, 2023 - mdpi.com
The rapid growth of the Internet of Things (IoT) has led to an increased automation and interconnectivity of devices without requiring user intervention, thereby enhancing the …
The Internet of Things (IoT) has transformed our interaction with technology and introduced security challenges. The growing number of IoT attacks poses a significant threat to …
Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling development of future cities that are inherently sustainable. Intrusion detection for such …
G Kalnoor, S Gowrishankar - Soft Computing, 2021 - Springer
One of the most basic characteristic features of every smart device in a network based on the Internet of Things (IoT) is to gather a larger set of data that has been created and then …
G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …