GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways

J Cao, Y Xu, E Yu, Q Xiang, K Song, L He, G Cheng - Computer Networks, 2024 - Elsevier
Abstract The Internet of Things (IoT) landscape is booming, and a wide range of IoT
endpoints has been integrated into various aspects of life, opening opportunities for …

5G and edge: A reinforcement learning approach for Virtual Network Embedding with cost optimization and improved acceptance rate

CL Moreira, CA Kamienski, RAC Bianchi - Computer Networks, 2024 - Elsevier
Abstract 5G technologies are fueling a revolution across numerous industries, including
manufacturing, healthcare, and entertainment, by enabling the development and …

A hybrid evolutionary and machine learning approach for smart city planning: Digital twin approach

C Ji, Y Niu - Sustainable Energy Technologies and Assessments, 2024 - Elsevier
The amalgamation of Internet of Things (IoT) and communication systems within Smart Grid
Control Systems (SGCS) has amplified their susceptibility to cyber-attacks, posing a …

[HTML][HTML] Novel Network Intrusion Detection Based on Feature Filtering Using FLAME and New Cuckoo Selection in a Genetic Algorithm

K Alzboon, J Al-Nihoud, W Alsharafat - Applied Sciences, 2023 - mdpi.com
Recently, networks have faced a significant challenge in terms of security due to constant
unauthorized access by hackers, resulting in the compromise of network user data. To …

Intrusion Detection Systems and its application in latest Networking Technologies–A Survey

K Shanthi, R Maruthi - Educational Administration: Theory and Practice, 2024 - kuey.net
The attackers are using different techniques to intrude themselves into the network or system
to steal our data. The intruding techniques are increasing day by day and it is very difficult to …

Towards Secure IoMT: Attack Detection Using Deep Q-Learning in Healthcare Networks

LA Daher - … 16th International Conference on Developments in …, 2023 - ieeexplore.ieee.org
With the wide advent of IoT systems in the health-care industry, not to mention that medical
data is confidential and critical, any alteration in the data could affect the patients' treatment …

Evasion-Aware Botnet Attack Detection using Deep Reinforcement Adversarial Learning

K Anand, RR Budaraju, S Kumar, BM Rao… - International Journal of …, 2024 - ijisae.org
Adversarial evasions represent contemporary challenges for applications relying on
Machine Learning (ML). The susceptibility of traditional ML inference systems introduces …

An optimal secure defense mechanism for DDoS attack in IoT network using feature optimization and intrusion detection system

JS Prasath, VI Shyja, P Chandrakanth… - Journal of Intelligent & … - content.iospress.com
Now, the Cyber security is facing unprecedented difficulties as a result of the proliferation of
smart devices in the Internet of Things (IoT) environment. The rapid growth in the number of …