Reliable machine learning model for IIoT botnet detection

F Taher, M Abdel-Salam, M Elhoseny… - IEEE …, 2023 - ieeexplore.ieee.org
Due to the growing number of Industrial Internet of Things (IoT) devices, network attacks like
denial of service (DoS) and floods are rising for security and reliability issues. As a result of …

Using Markov learning utilization model for resource allocation in cloud of thing network

SM Mirmohseni, C Tang, A Javadpour - Wireless Personal …, 2020 - Springer
The integration of the Internet of Things (IoT) and cloud environment has led to the creation
of Cloud of Things, which has given rise to new challenges in IoT area. In this paper, using …

Building a cloud IDS using an efficient feature selection method and SVM

W Wang, X Du, N Wang - IEEE Access, 2018 - ieeexplore.ieee.org
Network traffic in cloud computing is characterized by a large volume of data, with potential
high dimensionality and high levels of redundancy.“Big data” not only retard the execution …

Encryption as a service for IoT: opportunities, challenges and solutions

A Javadpour, F Ja'fari, T Taleb, Y Zhao… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …

NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN)

AC Sumathi, A Javadpour, P Pinto… - International Journal of …, 2022 - Springer
Abstract Internet of Things (IoT) and Wireless Sensor Networks (WSN) are a set of low-cost
wireless sensors that can collect, process and send environment's data. WSN nodes are …

A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural …

SS Sathiyadhas… - International Journal of …, 2022 - Wiley Online Library
In cloud computing, the resources and memory are dynamically allocated to the user based
on their needs. Security is considered as a major issue in cloud as the use of cloud is …

Privacy-aware and ai techniques for healthcare based on k-anonymity model in internet of things

AK Sangaiah, A Javadpour, F Ja'fari… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The government and industry have given the recent development of the Internet of Things in
the healthcare sector significant respect. Health service providers retain data gathered from …

Improving resources management in network virtualization by utilizing a software-based network

A Javadpour - Wireless Personal Communications, 2019 - Springer
Network virtualization is a way to simultaneously run multiple heterogeneous architectures
on a shared substrate. The main issue in network virtualization is mapping virtual networks …

Detecting straggler MapReduce tasks in big data processing infrastructure by neural network

A Javadpour, G Wang, S Rezaei, KC Li - The Journal of Supercomputing, 2020 - Springer
Straggler task detection is one of the main challenges in applying MapReduce for
parallelizing and distributing large-scale data processing. It is defined as detecting running …

Multi-step attack detection based on pre-trained hidden Markov models

X Zhang, T Wu, Q Zheng, L Zhai, H Hu, W Yin, Y Zeng… - Sensors, 2022 - mdpi.com
Currently, hidden Markov-based multi-step attack detection models are mainly trained using
the unsupervised Baum–Welch algorithm. The Baum–Welch algorithm is sensitive to the …