[HTML][HTML] A peer-to-peer blockchain based interconnected power system

MM Ahmed, MK Hasan, M Shafiq, MO Qays… - Energy Reports, 2021 - Elsevier
Utilities produce and supply products following local requirements and with the
synchronizations which connect subscribers. Harmonics is a power efficiency/quality …

[HTML][HTML] Application layer-based denial-of-service attacks detection against IoT-CoAP

SM Almeghlef, AALM AL-Ghamdi, MS Ramzan… - Electronics, 2023 - mdpi.com
Internet of Things (IoT) is a massive network based on tiny devices connected internally and
to the internet. Each connected device is uniquely identified in this network through a …

Enhancing DDoS attack detection using snake optimizer with ensemble learning on internet of things environment

M Aljebreen, HA Mengash, MA Arasi… - IEEE …, 2023 - ieeexplore.ieee.org
A more widespread Internet of Things (IoT) device is performing a surge in cyber-attacks,
with Distributed Denial of Service (DDoS) attacks posing a major risk to the reliability and …

Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities

RK Muna, MI Hossain, MGR Alam, MM Hassan, M Ianni… - Internet of Things, 2023 - Elsevier
Smart cities rely heavily on Internet of Things (IoT) technology, which enables automation
services through interconnected IoT devices. However, the widespread use of IoT …

[HTML][HTML] Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

S Dalal, UK Lilhore, N Faujdar, S Simaiya… - Journal of Cloud …, 2023 - Springer
Billions of gadgets are already online, making the IoT an essential aspect of daily life.
However, the interconnected nature of IoT devices also leaves them open to cyber threats …

Intrusion detection framework for IoT-based smart environments security

C Hazman, S Benkirane, A Guezzaz, M Azrour… - … Conference on Artificial …, 2022 - Springer
Since of huge progress of Internet of things (IoT) and networking technologies, and the
expanding number of devices linked to the Internet, security and privacy problems must be …

[HTML][HTML] A GPU-based machine learning approach for detection of botnet attacks

M Motylinski, Á MacDermott, F Iqbal, B Shah - Computers & Security, 2022 - Elsevier
Rapid development and adaptation of the Internet of Things (IoT) has created new problems
for securing these interconnected devices and networks. There are hundreds of thousands …

E2EGI: End-to-End gradient inversion in federated learning

Z Li, L Wang, G Chen, Z Zhang… - IEEE Journal of …, 2022 - ieeexplore.ieee.org
A plethora of healthcare data is produced every day due to the proliferation of prominent
technologies such as Internet of Medical Things (IoMT). Digital-driven smart devices like …

Multicriteria decision and machine learning algorithms for component security evaluation: library‐based overview

J Zhang, S Nazir, A Huang… - Security and …, 2020 - Wiley Online Library
Components are the significant part of a system which plays an important role in the
functionality of the system. Components are the reusable part of a system which are already …

Fruit and vegetable disease detection and classification: Recent trends, challenges, and future opportunities

S Gupta, AK Tripathi - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
Fruits and vegetables are major sources of nutrients for the majority of the population across
the globe. With the rapid increase in population, the objectives of the future agro-industry are …