Anomaly detection in WSN IoT (Internet of Things) environment through a consensus-based anomaly detection approach

A CL, R Sumathi - Multimedia Tools and Applications, 2023 - Springer
The most essential part of any IoT (Internet of Things) model is the wireless network sensors
(WSN). The application of these networks combined with the latest technologies relating to …

Improving the resilience of the constrained Internet of Things: a moving target defense approach

RE Navas - 2020 - theses.hal.science
Internet of Things (IoT) systems are increasingly being deployed in the real world, but their
security lags behind the state of the art of non-IoT systems. Moving Target Defense (MTD) is …

[PDF][PDF] ADDRESS SHUFFLING AI TECHNIQUES FOR IOT SECURITY USING RASPBERRY PI

P Kumar, A Gupta - Journal of Data Acquisition and Processing, 2023 - sjcjycl.cn
One of the primary security risks in IoT networks is address-based attacks, where hackers
can exploit vulnerabilities by targeting specific IP addresses. To address this issue, various …

Network Security from the Perspective of the Internet of Things

A Zhou - Journal of Physics: Conference Series, 2022 - iopscience.iop.org
Networking is one of the new technologies supported by our country's national" 125"
strategic industry plan, mainly used in medicine, military industry, transportation and other …

[引用][C] A Comprehensive Analysis and Visualization of Trends and Research Patterns in the Field of IoT Smart Cities

C Sharma, S Sharma, M Gheisari - International Journal of Advanced Science and …, 2025