The comparison of low-rank-based learning models for multi-label categorization of attacks for intrusion detection datasets is presented in this work. In particular, we investigate the …
SB Hulayyil, S Li, L Xu - Electronics, 2023 - mdpi.com
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT …
LA Ajao, ST Apeh - Intelligent Systems with Applications, 2023 - Elsevier
Abstract The Industrial Internet of Things (IIoT) revolution has emerged as a promising network that enhanced information dissemination about the city's resources. This city's …
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …
I Ahmad, Z Wan, A Ahmad - Internet of Things, 2023 - Elsevier
Abstract Internet of Things (IoT) devices significantly threaten tech-dependant businesses and communities. With the rapid integration of IoT devices into local networks, a system to …
Cyber attacks have evolved, making predicting and preventing their occurrence difficult. The complexity of cyber threats has contributed to the development of technology-intensive …
Wireless Sensor Networks (WSNs) are the key underlying technology of the Internet of Things (IoT); however, these networks are energy constrained. Security has become a major …
Abstract The Internet of Things can be considered a technological revolution and has successfully merged the physical world with the digital world. However, heterogeneous IoT …
T Alatawi, A Aljuhani - Computers, Materials & Continua, 2022 - search.ebscohost.com
The rapid development of the Internet of Things (IoT) in the industrial domain has led to the new term the Industrial Internet of Things (IIoT). The IIoT includes several devices …