Intrusion detection and prevention in fog based IoT environments: A systematic literature review

CA de Souza, CB Westphall, RB Machado, L Loffi… - Computer Networks, 2022 - Elsevier
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …

Binary starling murmuration optimizer algorithm to select effective features from medical data

MH Nadimi-Shahraki, Z Asghari Varzaneh, H Zamani… - Applied Sciences, 2022 - mdpi.com
Feature selection is an NP-hard problem to remove irrelevant and redundant features with
no predictive information to increase the performance of machine learning algorithms. Many …

Optimized machine learning-based intrusion detection system for fog and edge computing environment

OA Alzubi, JA Alzubi, M Alazab, A Alrabea, A Awajan… - Electronics, 2022 - mdpi.com
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …

Binary approaches of quantum-based avian navigation optimizer to select effective features from high-dimensional medical data

MH Nadimi-Shahraki, A Fatahi, H Zamani, S Mirjalili - Mathematics, 2022 - mdpi.com
Many metaheuristic approaches have been developed to select effective features from
different medical datasets in a feasible time. However, most of them cannot scale well to …

Novel online network intrusion detection system for industrial IoT based on OI-SVDD and AS-ELM

E Gyamfi, AD Jurcut - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) should be equipped with computational resources to
detect network intrusions, types of attacks, and update their models automatically in real …

Machine learning technologies for big data analytics

AH Gandomi, F Chen, L Abualigah - Electronics, 2022 - mdpi.com
Big data analytics is one high focus of data science and there is no doubt that big data is
now quickly growing in all science and engineering fields. Big data analytics is the process …

Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing

D Mohamed, O Ismael - Journal of Cloud Computing, 2023 - Springer
Nowadays, with the proliferation of internet of things-connected devices, the scope of cyber-
attacks on the internet of things has grown exponentially. So, it makes it a necessity to …

Iot-based intrusion detection systems: a review

TS Mohamed, S Aydin - Smart Science, 2022 - Taylor & Francis
ABSTRACT Internet of Things (IoT) is a modern prototype that merges physical entities
affiliated with a variety of fields, like industrial tasks, firm automation, mortal fitness, and …

Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities

YK Saheed, OH Abdulganiyu, TA Tchakoucht - Applied Soft Computing, 2024 - Elsevier
The emergence of smart cities is an example of how new technologies, such as the Internet
of Things (IoT), have facilitated the creation of extensive interconnected and intelligent …

[HTML][HTML] An intelligent context-aware threat detection and response model for smart cyber-physical systems

Z Noor, S Hina, F Hayat, GA Shah - Internet of Things, 2023 - Elsevier
Smart cities, businesses, workplaces, and even residences have all been converged by the
Internet of Things (IoT). The types and characteristics of these devices vary depending on …