Intrusion detection and prevention in fog based IoT environments: A systematic literature review

CA de Souza, CB Westphall, RB Machado, L Loffi… - Computer Networks, 2022 - Elsevier
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …

An IOT based smart grid system for advanced cooperative transmission and communication

MA Alomar - Physical Communication, 2023 - Elsevier
Abstract In the Internet of Things (IoT) ecosystem, devices will predominate, using it in a
manner similar to how people used it. Devices will cooperating in a multicast network to …

Machine-Learning Forensics: State of the Art in the Use of Machine-Learning Techniques for Digital Forensic Investigations within Smart Environments

L Tageldin, H Venter - Applied Sciences, 2023 - mdpi.com
Recently, a world-wide trend has been observed that there is widespread adoption across
all fields to embrace smart environments and automation. Smart environments include a …

Efficient intrusion detection using multi-player generative adversarial networks (GANs): an ensemble-based deep learning architecture

R Soleymanzadeh, R Kashef - Neural Computing and Applications, 2023 - Springer
Intrusion detection systems (IDSs) investigate various attacks, identify malicious patterns,
and implement effective control strategies. With the recent advances in machine learning …

Intrusion detection method based on denoising diffusion probabilistic models for uav networks

Y Wang, J Ding, X He, Q Wei, S Yuan… - Mobile Networks and …, 2023 - Springer
Security is important for UAV networks because of the need for a cyber-secure flying air
space for UAV group communication to complete the complex tasks cooperatively. Network …

[Retracted] Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments

J Xing, Z Zhang - Security and Communication Networks, 2022 - Wiley Online Library
This paper presents an in‐depth study and analysis of hierarchical network security
measurement and optimal active defense in the cloud computing environment. All the cloud …

An optimal secure defense mechanism for DDoS attack in IoT network using feature optimization and intrusion detection system

JS Prasath, VI Shyja, P Chandrakanth… - Journal of Intelligent …, 2024 - content.iospress.com
Now, the Cyber security is facing unprecedented difficulties as a result of the proliferation of
smart devices in the Internet of Things (IoT) environment. The rapid growth in the number of …

The future roadmap for cyber-attack detection

R Soleymanzadeh, R Kashef - 2022 6th international …, 2022 - ieeexplore.ieee.org
Cyber-attacks can cause delays in world operations and substantial economic losses.
Therefore, there is a greater interest in cyber-attack detection (CAD) to accommodate the …

AI/ML driven intrusion detection framework for IoT enabled cold storage monitoring system

M Prasad, P Pal, S Tripathi, K Dahal - Security and Privacy, 2022 - Wiley Online Library
An IoT‐based monitoring system remotely controls and manages intelligent environments.
Due to wireless communication, deployed sensor nodes are more vulnerable to attacks. An …

Securing IoT network with hybrid evolutionary lion intrusion detection system: a composite motion optimisation algorithm for feature selection and ensemble …

A Subramaniam, S Chelladurai, SK Ande… - … of Experimental & …, 2024 - Taylor & Francis
Networks connected to the Internet of Things (IoT) are often vulnerable to attacks. Several
existing methods in the intrusion detection system for securing IoT have been presented with …