Hybrid of Supervised Learning and Optimization Algorithm for Optimal Detection of IoT Distributed Denial of Service Attacks

T Farid, M Sirat - International Journal of Innovative Computing, 2023 - ijic.utm.my
The high-speed internet has led to the development of Internet of Things (IoT) with a
fundamental Three-Layer IoT architecture. However, small amount of un-indicative data …

Software-defined security controller-based group management and end-to-end security management

E Festijo, Y Jung, M Peradilla - Journal of Ambient Intelligence and …, 2019 - Springer
This paper proposes group management and end-to-end security management based on
the horizontal model suitable for group based private systems. The software-defined security …

Internet of things (IoT) as interconnection of threats (IoT)

N Jeyanthi - Security and Privacy in Internet of Things (IoTs), 2016 - api.taylorfrancis.com
People worldwide are now ready to enjoy the benefits of the Internet of Things (IoT). The IoT
incorporates everything from the body sensor to the recent cloud computing. It comprises …

[PDF][PDF] Security threats and recommendation in IoT healthcare

C Eken, H Eken - Proceedings of the 9th EUROSIM & the 57th SIMS, 2016 - ep.liu.se
Abstract The Internet of Things (IoT) devices have become popular in recent year. All
devices connect network and communicate each other. Therefore all devices become smart …

Internet Of Things (IOT): Origin, Embedded Technologies, Smart Applications and its Growth in the Last Decade

JS Yalli, MH Hasan, A Badawi - IEEE Access, 2024 - ieeexplore.ieee.org
The idea of the IOT started way back in 1982 when a bending machine is connected to the
internet, then to the concept of Mark Weiser in 1992, then RFID, and so on. A detailed …

Pushing software-defined blockchain components onto edge hosts

M Samaniego, R Deters - arXiv preprint arXiv:1909.09936, 2019 - arxiv.org
With the advent of blockchain technology, some management tasks of IoT networks can be
moved from central systems to distributed validation authorities. Cloud-centric blockchain …

[HTML][HTML] Security review in internet of things

F Ali, MS Khan, H Akhtar - Internet of Things and Cloud Computing, 2019 - ajtaab.org
In this decade, the exceedingly rising state of the art industry is internet of things where
trillion devices will be connected. IoT is being appraised to transform the concept of …

Security concerns and countermeasures in IoT-integrated smart buildings

K Rathinavel, M Pipattanasomporn… - 2017 IEEE Power & …, 2017 - ieeexplore.ieee.org
The integration of Internet-of-Thing (IoT) devices to smart buildings raises the risk of
vulnerabilities in building operation. This paper presents the software development work for …

IoT Security Challenges and Mitigations: An Introduction

S Millar - arXiv preprint arXiv:2112.14618, 2021 - arxiv.org
The use of IoT in society is perhaps already ubiquitous, with a vast attack surface offering
multiple opportunities for malicious actors. This short paper first presents an introduction to …

[PDF][PDF] A novel security architecture of internet of things

F Ali, H Yigang, R Yi - International Journal of Computer Theory and …, 2019 - academia.edu
In this era, the preeminent internet of things industry paradigms grasps the pledge to
transfigure the concept of communication with the connectivity of billions of devices and …