An overview of the security challenges in IoT environment

S Dargaoui, M Azrour, A El Allaoui, F Amounas… - Advanced technology for …, 2023 - Springer
The internet of things (IoT) is a huge network of heterogeneous devices; sensors and
actuators, which provide a better world of services such as smart cities, smart grid, health …

[HTML][HTML] Deep learning-based intrusion detection approach for securing industrial Internet of Things

S Soliman, W Oudah, A Aljuhani - Alexandria Engineering Journal, 2023 - Elsevier
The widespread deployment of the Internet of Things (IoT) into critical sectors such as
industrial and manufacturing has resulted in the Industrial Internet of Things (IIoT). The IIoT …

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey

S Ali, Q Li, A Yousafzai - Ad Hoc Networks, 2024 - Elsevier
The industrial internet of things (IIoT) is an evolutionary extension of the traditional Internet of
Things (IoT) into processes and machines for applications in the industrial sector. The IIoT …

Revolutionizing cyber threat detection with large language models

MA Ferrag, M Ndhlovu, N Tihanyi, LC Cordeiro… - arXiv preprint arXiv …, 2023 - arxiv.org
Natural Language Processing (NLP) domain is experiencing a revolution due to the
capabilities of Pre-trained Large Language Models (LLMs), fueled by ground-breaking …

Towards an intelligent intrusion detection system to detect malicious activities in cloud computing

H Attou, M Mohy-eddine, A Guezzaz, S Benkirane… - Applied Sciences, 2023 - mdpi.com
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics,
such as scalability and flexibility. However, despite these advantages, security concerns …

Novel class probability features for optimizing network attack detection with machine learning

A Raza, K Munir, MS Almutairi, R Sehar - IEEE Access, 2023 - ieeexplore.ieee.org
Network attacks refer to malicious activities exploiting computer network vulnerabilities to
compromise security, disrupt operations, or gain unauthorized access to sensitive …

[PDF][PDF] Fortifying IoT against crimpling cyber-attacks: a systematic review

U Tariq, I Ahmed, MA Khan, AK Bashir - Karbala International Journal of …, 2023 - iasj.net
The rapid growth and increasing demand for Internet of Things (IoT) devices in our everyday
lives create exciting opportunities for human involvement, data integration, and seamless …

An intrusion detection system using BoT-IoT

S Alosaimi, SM Almutairi - Applied Sciences, 2023 - mdpi.com
The rapid growth of the Internet of Things (IoT) has led to an increased automation and
interconnectivity of devices without requiring user intervention, thereby enhancing the …

Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment

A Binbusayyis - Expert Systems with Applications, 2024 - Elsevier
Fog computing (FC) extends cloud technology by providing services, storage, and network
interaction between data centers and end devices. By putting storage and processing closer …

Toward an intrusion detection model for IoT-based smart environments

C Hazman, A Guezzaz, S Benkirane… - Multimedia Tools and …, 2023 - Springer
Abstract Nowadays, modern Internet of Things (IoT) applications are enabling smart cities
across the world. They provide remote device monitoring, management, and control, and …