D Kilichev, D Turimov, W Kim - Mathematics, 2024 - mdpi.com
In the evolving landscape of Internet of Things (IoT) and Industrial IoT (IIoT) security, novel and efficient intrusion detection systems (IDSs) are paramount. In this article, we present a …
Nowadays, the Internet of Things (IoT) has become a rapid development; it can be employed by cyber threats in IoT devices. A correct system to recognize malicious attacks at IoT …
MM Issa, M Aljanabi, HM Muhialdeen - Journal of Intelligent Systems, 2024 - degruyter.com
Abstract Machine learning (ML) and deep learning (DL) techniques have demonstrated significant potential in the development of effective intrusion detection systems. This study …
Abstract The Internet of Things (IoT) has performed a paradigm shift in the method devices and systems interact, allowing seamless connectivity and communication. But, the …
AW Burange, VM Deshmukh, YA Thakare… - Computer Standards & …, 2025 - Elsevier
This study presents an innovative IoT routing security model that integrates trust management to bolster network reliability, improve resilience against routing attacks, and …
J Aljabri, N Alzaben, N NEMRI, S Alahmari… - Alexandria Engineering …, 2024 - Elsevier
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to this domain because of the number of IoT devices and private data they can handle. IoT …
S Budania, MV Shenoy - … of the 25th International Conference on …, 2024 - dl.acm.org
Routing Protocol for Low-Power and Lossy Networks (RPL) is a widely used routing protocol in low-power and lossy networks especially when convergecast traffic is predominant. RPL …
This chapter gives an extensive background of the study by introducing the design and performance of routing attacks in FANET. The contributions of this study, the research gap of …
The use of Internet of Things systems has increased to meet the need for smart systems in various fields, such as smart homes, intelligent industries, medical systems, agriculture, and …