Security and privacy on 6g network edge: A survey

B Mao, J Liu, Y Wu, N Kato - IEEE communications surveys & …, 2023 - ieeexplore.ieee.org
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …

[HTML][HTML] IoT anomaly detection methods and applications: A survey

A Chatterjee, BS Ahmed - Internet of Things, 2022 - Elsevier
Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly
expanding field. This growth necessitates an examination of application trends and current …

A survey on cyber-security of connected and autonomous vehicles (CAVs)

X Sun, FR Yu, P Zhang - IEEE Transactions on Intelligent …, 2021 - ieeexplore.ieee.org
As the general development trend of the automotive industry, connected and autonomous
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …

[HTML][HTML] Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks

J Bhayo, SA Shah, S Hameed, A Ahmed, J Nasir… - … Applications of Artificial …, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a complex and diverse network consisting of resource-
constrained sensors/devices/things that are vulnerable to various security threats …

Semi-supervised spatiotemporal deep learning for intrusions detection in IoT networks

M Abdel-Basset, H Hawash… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The rapid growth of the Internet of Things (IoT) technologies has generated a huge amount
of traffic that can be exploited for detecting intrusions through IoT networks. Despite the great …

Collective deep reinforcement learning for intelligence sharing in the internet of intelligence-empowered edge computing

Q Tang, R Xie, FR Yu, T Chen, R Zhang… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Edge intelligence is emerging as a new interdiscipline to push learning intelligence from
remote centers to the edge of the network. However, with its widespread deployment, new …

Learning-based scalable scheduling and routing co-design with stream similarity partitioning for time-sensitive networking

L Xu, Q Xu, J Tu, J Zhang, Y Zhang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The deterministic and real-time communication is the indispensable requirement in
Industrial Internet of Things (IIoT) application areas. Time-sensitive networking (TSN) is a …

Potential identity resolution systems for the industrial Internet of Things: A survey

Y Ren, R Xie, FR Yu, T Huang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In recent years, the Industrial Internet of Things (IIoT) came into being. IIoT connects
sensors, industrial equipment, products, and staff in the factory, enabling context-awareness …

A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

[HTML][HTML] A novel, efficient, and secure anomaly detection technique using DWU-ODBN for IoT-enabled multimedia communication systems

M Sathya, M Jeyaselvi, L Krishnasamy… - … and Mobile Computing, 2021 - hindawi.com
The Internet of Things (IoT) is enhancing our lives in a variety of structures, which consists of
smarter cities, agribusiness, and e-healthcare, among others. Even though the Internet of …