[HTML][HTML] Enhancing IoT network security through deep learning-powered Intrusion Detection System

SA Bakhsh, MA Khan, F Ahmed, MS Alshehri, H Ali… - Internet of Things, 2023 - Elsevier
The rapid growth of the Internet of Things (IoT) has brought about a global concern for the
security of interconnected devices and networks. This necessitates the use of efficient …

CNN-CNN: dual convolutional neural network approach for feature selection and attack detection on internet of things networks

BA Alabsi, M Anbar, SDA Rihan - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) has brought significant advancements that have connected our
world more closely than ever before. However, the growing number of connected devices …

[HTML][HTML] Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review

S Sharma, V Kumar, K Dutta - Internet of Things and Cyber-Physical …, 2024 - Elsevier
The significance of intrusion detection systems in networks has grown because of the digital
revolution and increased operations. The intrusion detection method classifies the network …

Feature selection based nature inspired capuchin search algorithm for solving classification problems

M Braik, A Hammouri, H Alzoubi, A Sheta - Expert Systems with …, 2024 - Elsevier
Identification of the optimal subset of features for Feature Selection (FS) problems is a
demanding problem in machine learning and data mining. A trustworthy optimization …

A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks

MM Inuwa, R Das - Internet of Things, 2024 - Elsevier
This study explores the growing challenges of cybersecurity in the context of rapidly adopted
Internet of Things (IoT) technologies, which have become increasingly susceptible to cyber …

Securing internet of things using machine and deep learning methods: a survey

A Ghaffari, N Jelodari, S pouralish, N derakhshanfard… - Cluster …, 2024 - Springer
Abstract The Internet of Things (IoT) is a vast network of devices with sensors or actuators
connected through wired or wireless networks. It has a transformative effect on integrating …

Intrusion detection in Internet of things using improved binary golden jackal optimization algorithm and LSTM

AV Hanafi, A Ghaffari, H Rezaei, A Valipour… - Cluster Computing, 2024 - Springer
Internet of things (IoT) technology has gained a reputation in recent years due to its ease of
use and adaptability. Due to the amount of sensitive and significant data exchanged over the …

Many-objective optimization based intrusion detection for in-vehicle network security

J Zhang, B Gong, M Waqas, S Tu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In-vehicle network security plays a vital role in ensuring the secure information transfer
between vehicle and Internet. The existing research is still facing great difficulties in …

Exploiting fuzzy rough entropy to detect anomalies

S Wang, Z Yuan, C Luo, H Chen, D Peng - International Journal of …, 2024 - Elsevier
Anomaly detection has been used in a wide range of fields. However, most of the current
detection methods are only applicable to certain data, ignoring uncertain information such …

Enhanced pelican optimization algorithm with ensemble-based anomaly detection in industrial internet of things environment

N Chander, M Upendra Kumar - Cluster Computing, 2024 - Springer
Anomaly detection (AD) in the industrial internet of things (IIoT) platform is said to be the
major module of security the consistency, safety, and efficacy of industrial procedures. In …