Autonomous Threat Response at the Edge Processing Level in the Industrial Internet of Things

G Czeczot, I Rojek, D Mikołajewski - Electronics, 2024 - mdpi.com
Industrial Internet of Things (IIoT) technology, as a subset of the Internet of Things (IoT) in the
concept of Industry 4.0 and, in the future, 5.0, will face the challenge of streamlining the way …

Phishing and intrusion attacks: An overview of classification mechanisms

S Tareen, SU Bazai, S Ullah, R Ullah… - 2022 3rd …, 2022 - ieeexplore.ieee.org
The digital world is becoming increasingly interconnected and cyberattacks such as
phishing are becoming more common. Fraudulent emails and bogus websites are used to …

[HTML][HTML] Particle swarm optimization based artificial neural network (PSO-ANN) model for effective k-barrier count intrusion detection system in WSN

SL Narayanan, M Kasiselvanathan… - Measurement …, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSN) offers an extensive array of possibilities and finds
application to nearly every wake of human lifetime. Two of the methods are intrusion …

A federated-ANFIS for collaborative intrusion detection in securing decentralized autonomous organizations

YP Tsang, CH Wu, N Dong - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Blockchain has facilitated the emergence of automation and decentralization concepts,
leading to significant organizational and operational changes in businesses, eg …

An Empirical Study on Detection of Android Adware Using Machine Learning Techniques

U Farooq, SS Khurana, P Singh, M Kumar - Multimedia Tools and …, 2024 - Springer
The Android operating system, without showing signs of diminishing, has experienced
unprecedented popularity and continues to thrive with a significant user base. Its notable …

Kalman and Cauchy clustering for anomaly detection based authentication of IoMTs using extreme learning machine

TS Mohamed, S Aydin, A Alkhayyat… - IET …, 2022 - Wiley Online Library
The vulnerabilities of the Internet of Things (IoTs) in general and the Internet of Mobile
Things (IoMTs) in particular motivate researchers to equip them with security systems …

An Effective Method for Detecting Unknown Types of Attacks Based on Log-Cosh Variational Autoencoder

L Yu, L Xu, X Jiang - Applied Sciences, 2023 - mdpi.com
The increasing prevalence of unknown-type attacks on the Internet highlights the importance
of developing efficient intrusion detection systems. While machine learning-based …

An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152

J Saikam, K Ch - International Journal of Information Security, 2024 - Springer
Over the past ten years, there has been a significant increase in computer network
intrusions, partly due to a thriving black market for cybercrime and the availability of …

Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things

D Manivannan - Journal of Network and Computer Applications, 2024 - Elsevier
The significant advancements in sensors and other resource-constrained devices, capable
of collecting data and communicating wirelessly, are poised to revolutionize numerous …

Causal effect analysis-based intrusion detection system for IoT applications

S Bhaskara, SS Rathore - International Journal of Information Security, 2023 - Springer
Intrusion detection systems (IDSs) are employed at various levels in the network to either
detect or prevent an intrusion that could cause irrecoverable data damage in IoT …