Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security

S Krishnasamy, MB Alotaibi, LI Alehaideb, Q Abbas - Sensors, 2023 - mdpi.com
In the current digital era, Wireless Sensor Networks (WSNs) and the Internet of Things (IoT)
are evolving, transforming human experiences by creating an interconnected environment …

Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models

D Kilichev, D Turimov, W Kim - Mathematics, 2024 - mdpi.com
In the evolving landscape of Internet of Things (IoT) and Industrial IoT (IIoT) security, novel
and efficient intrusion detection systems (IDSs) are paramount. In this article, we present a …

Enhancing cybersecurity in the internet of things environment using bald eagle search optimization with hybrid deep learning

LA Maghrabi, S Shabanah, T Althaqafi… - IEEE …, 2024 - ieeexplore.ieee.org
Nowadays, the Internet of Things (IoT) has become a rapid development; it can be employed
by cyber threats in IoT devices. A correct system to recognize malicious attacks at IoT …

Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations

MM Issa, M Aljanabi, HM Muhialdeen - Journal of Intelligent Systems, 2024 - degruyter.com
Abstract Machine learning (ML) and deep learning (DL) techniques have demonstrated
significant potential in the development of effective intrusion detection systems. This study …

Class imbalance data handling with optimal deep learning-based intrusion detection in IoT environment

M Srinivasan, NC Senthilkumar - Soft Computing, 2024 - Springer
Abstract The Internet of Things (IoT) has performed a paradigm shift in the method devices
and systems interact, allowing seamless connectivity and communication. But, the …

Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence

AW Burange, VM Deshmukh, YA Thakare… - Computer Standards & …, 2025 - Elsevier
This study presents an innovative IoT routing security model that integrates trust
management to bolster network reliability, improve resilience against routing attacks, and …

[HTML][HTML] Hybrid stacked autoencoder with dwarf mongoose optimization for Phishing attack detection in internet of things environment

J Aljabri, N Alzaben, N NEMRI, S Alahmari… - Alexandria Engineering …, 2024 - Elsevier
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to
this domain because of the number of IoT devices and private data they can handle. IoT …

OEAD: An Online Ensemble-based Anomaly Detection technique for RPL network

S Budania, MV Shenoy - … of the 25th International Conference on …, 2024 - dl.acm.org
Routing Protocol for Low-Power and Lossy Networks (RPL) is a widely used routing protocol
in low-power and lossy networks especially when convergecast traffic is predominant. RPL …

[PDF][PDF] NURUDEEN BODE AYANSINA

IN FANET - 2023 - docs.neu.edu.tr
This chapter gives an extensive background of the study by introducing the design and
performance of routing attacks in FANET. The contributions of this study, the research gap of …

Designing a Novel RPL Objective Function & Testing RPL Objective Functions Performance

K Mardini, E Abdulsamad - 2023 - diva-portal.org
The use of Internet of Things systems has increased to meet the need for smart systems in
various fields, such as smart homes, intelligent industries, medical systems, agriculture, and …