J Li, MS Othman, H Chen, LM Yusuf - Journal of Big Data, 2024 - Springer
Abstract Internet of Things (IoT) devices are widely used but also vulnerable to cyberattacks that can cause security issues. To protect against this, machine learning approaches have …
H Asgharzadeh, A Ghaffari, M Masdari… - Journal of Bionic …, 2024 - Springer
In recent years, developed Intrusion Detection Systems (IDSs) perform a vital function in improving security and anomaly detection. The effectiveness of deep learning-based …
Botnets have emerged as a significant internet security threat, comprising networks of compromised computers under the control of command and control (C&C) servers. These …
M Bulut, ME Uyar, E Özcan - Engineering Applications of Artificial …, 2024 - Elsevier
While blockchain technology and cryptocurrencies offer numerous advantages and innovations, it is essential to be aware that their implementation processes are fraught with a …
Enhancing IoT security is a corner stone for building trust in its technology and driving its growth. Limited resources and diversified nature of IoT devices make them vulnerable to …
AI Hassan, EA El Reheem, SK Guirguis - Scientific Reports, 2024 - nature.com
Software-defined networks (SDNs) have been growing rapidly due to their ability to provide an efficient network management approach compared to traditional methods. However, one …
Abstract The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by enabling seamless connectivity and automation. However, the widespread …
Abstract Internet of Things (IoT) networks consist of physical devices connected to the Internet, embedded with actuators, sensors, and communication components that exchange …
F Wahab, A Shah, I Khan, B Ali, M Adnan - Computers and Electrical …, 2024 - Elsevier
Smart homes, healthcare, transportation, agriculture, manufacturing, and many more sectors can all benefit from IoT technology. This revolutionary way of interacting with the world could …