[HTML][HTML] Adversarial machine learning in IoT from an insider point of view

F Aloraini, A Javed, O Rana, P Burnap - Journal of Information Security and …, 2022 - Elsevier
With the rapid progress and significant successes in various applications, machine learning
has been considered a crucial component in the Internet of Things ecosystem. However …

Linking blockchain technology and digital advertising: How blockchain technology can enhance digital advertising to be more effective, efficient, and trustworthy

J Kim, KH Lee, J Kim - Journal of Business Research, 2023 - Elsevier
Blockchain technology is often touted as a transformative solution for improving the current
over-centralized systems in our economy, where all tangible and intangible assets are …

Lightweight node-level malware detection and network-level malware confinement in iot networks

SMP Dinakarrao, H Sayadi, HM Makrani… - … , Automation & Test …, 2019 - ieeexplore.ieee.org
The sheer size of IoT networks being deployed today presents an" attack surface" and poses
significant security risks at a scale never before encountered. In other words, a single …

Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks

A Verma, V Ranga - Transactions on emerging …, 2020 - Wiley Online Library
Abstract The IPv6 Routing Protocol for Low‐Power and Lossy Networks (RPL) is the de facto
routing protocol for IPv6‐based Low‐Power Wireless Personal Area Networks (6LoWPAN) …

Wrapper-based deep feature optimization for activity recognition in the wearable sensor networks of healthcare systems

KK Sahoo, R Ghosh, S Mallik, A Roy, PK Singh… - Scientific Reports, 2023 - nature.com
Abstract The Human Activity Recognition (HAR) problem leverages pattern recognition to
classify physical human activities as they are captured by several sensor modalities. Remote …

[引用][C] Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - MDPI

A comprehensive survey on secure software‐defined network for the Internet of Things

M Babiker Mohamed, O Matthew Alofe… - Transactions on …, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) is the network of smart devices, sensors, and machines
that continuously monitored the surrounding environment and execute meaningful decisions …

IoT botnet attack detection based on optimized extreme gradient boosting and feature selection

M Alqahtani, H Mathkour, MM Ben Ismail - Sensors, 2020 - mdpi.com
Nowadays, Internet of Things (IoT) technology has various network applications and has
attracted the interest of many research and industrial communities. Particularly, the number …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

Heterogeneous network access and fusion in smart factory: A survey

D Xia, C Jiang, J Wan, J Jin, VCM Leung… - ACM Computing …, 2022 - dl.acm.org
With the continuous expansion of the Industrial Internet of Things (IIoT) and the increasing
connectivity among the various intelligent devices or systems, the control of access and …
为了回应用户根据美国数字千年版权法案 (DMCA) 向我们提交的投诉,我们已从此页上移除了 1 个结果。如果需要,您可以访问 LumenDatabase.org,查看导致结果遭到移除的 DMCA 投诉内容