Internet of Medical Things Security Frameworks for Risk Assessment and Management: A Scoping Review

K Svandova, Z Smutny - Journal of Multidisciplinary Healthcare, 2024 - Taylor & Francis
Background The massive expansion of the Internet of medical things (IoMT) technology
brings many opportunities for improving healthcare. At the same time, their use increases …

[PDF][PDF] Enhanced Metaheuristics with Machine Learning Enabled Cyberattack Detection Model.

AS Almasoud - Intelligent Automation & Soft Computing, 2023 - cdn.techscience.cn
The Internet of Things (IoT) is considered the next-gen connection network and is ubiquitous
since it is based on the Internet. Intrusion Detection System (IDS) determines the intrusion …

Enhancing the Internet of Medical Things (IoMT) Security with Meta-Learning: A Performance-Driven Approach for Ensemble Intrusion Detection Systems

M Alalhareth, SC Hong - Sensors, 2024 - mdpi.com
This paper investigates the application of ensemble learning techniques, specifically meta-
learning, in intrusion detection systems (IDS) for the Internet of Medical Things (IoMT). It …

[PDF][PDF] Next-gen security in IIoT: integrating intrusion detection systems with machine learning for industry 4.0 resilience.

L Idouglid, S Tkatek, K Elfayq… - International Journal of …, 2024 - researchgate.net
In the dynamic landscape of Industry 4.0, characterized by the integration of smart
technologies and the industrial internet of things (IIoT), ensuring robust security measures is …

Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network

Y Deng - Journal of Cyber Security and Mobility, 2024 - journals.riverpublishers.com
Continuous improvement of machine learning technology has provided more support for
intrusion security detection in the industrial Internet of Things (IoT). The intrusion security …

An Enhancement Multi-Objective Resource Allocation Algorithm in Fog Environment

NA El-Bahnasawy, A El-Nattat… - 2023 3rd …, 2023 - ieeexplore.ieee.org
For high transmission latency from users, cloud computing (CC) is not the best choice for
processing latency sensitive applications that require real time response with minimal delay …

The development of a model for the threat detection system with the use of machine learning and neural network methods

O Ussatova, A Zhumabekova, V Karyukin… - International Journal of …, 2024 - ijirss.com
This study examines the development of a model for the threat detection system with the use
of machine learning and neural network methods. The fast development of Internet …

[HTML][HTML] 2 LightGBM Feature Algorithm Fusion with Multi-layer Perceptual Network Theory

Y Deng - journals.riverpublishers.com
In neural network algorithms, LightGBM is an ensemble learning algorithm based on GBDT,
which is a variant of GBDT algorithm and follows the basic framework of GBDT. GBDT uses …