A review of security and privacy concerns in the internet of things (IoT)

M Aqeel, F Ali, MW Iqbal, TA Rana, M Arif… - Journal of …, 2022 - Wiley Online Library
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …

A review and analysis of the bot-iot dataset

JM Peterson, JL Leevy… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Machine learning is rapidly changing the cybersecu-rity landscape. The use of predictive
models to detect malicious activity and identify inscrutable attack patterns is providing levels …

A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network

R Kumar, P Kumar, R Tripathi, GP Gupta, S Garg… - Journal of Parallel and …, 2022 - Elsevier
Abstract The Internet of Things (IoT) is emerging as a new technology for the development of
various critical applications. However, these applications are still working on centralized …

A privacy-preserving-based secure framework using blockchain-enabled deep-learning in cooperative intelligent transport system

R Kumar, P Kumar, R Tripathi, GP Gupta… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Cooperative Intelligent Transport System (C-ITS) is a promising technology that aims to
improve the traditional transport management systems. In C-ITS infrastructure Autonomous …

smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks

SI Popoola, B Adebisi, R Ande, M Hammoudeh… - Sensors, 2021 - mdpi.com
Nowadays, hackers take illegal advantage of distributed resources in a network of
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …

[HTML][HTML] A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks

AK Dey, GP Gupta, SP Sahu - Decision Analytics Journal, 2023 - Elsevier
Abstract Internet of Things (IoT) enabled networks are highly vulnerable to cyber threats due
to insecure wireless communication, resource constraint architecture, different types of IoT …

Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm

H Asgharzadeh, A Ghaffari, M Masdari… - Journal of Parallel and …, 2023 - Elsevier
Nowadays, the growth and pervasiveness of Internet of Things (IoT) devices have led to
increased attacks by hackers and attackers. On the other hand, using IoT infrastructure in …

BDEdge: Blockchain and deep-learning for secure edge-envisioned green CAVs

P Kumar, R Kumar, GP Gupta… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Green Connected and Autonomous Vehicles (CAVs) are the future of next-generation
Intelligent Transportation Systems (ITS) that will help humans to improve road safety and …

DLTIF: Deep learning-driven cyber threat intelligence modeling and identification framework in IoT-enabled maritime transportation systems

P Kumar, GP Gupta, R Tripathi, S Garg… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is
successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the …

Hybrid meta-heuristic based feature selection mechanism for cyber-attack detection in iot-enabled networks

AK Dey, GP Gupta, SP Sahu - Procedia Computer Science, 2023 - Elsevier
Today's technologically advanced connected world is mostly reliant on the Internet of Things
(IoT)-enabled smart gadgets and easy connectivity. These smart gadgets are more …