Cryptography‐based deep artificial structure for secure communication using IoT‐enabled cyber‐physical system

C Kannan, M Dakshinamoorthy… - IET …, 2021 - Wiley Online Library
Internet of things (IoTs) enabled cyber‐physical systems is a system that provides
communication between physical devices and cyber environment. They run independently …

A survey on learning-based intrusion detection systems for IoT networks

S Abdelhamid, M Aref, I Hegazy… - 2021 Tenth …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) networks have developed tremendously over the past years. The
main concept behind this technology is to facilitate information exchange between devices …

Forensic analysis of fitness applications on android

R Sinha, V Sihag, G Choudhary, M Vardhan… - … Symposium on Mobile …, 2021 - Springer
People these days are getting more and more digitized. Every other person is using a
smartphone and wearing smartwatches. These days cell phones and wearable devices …

SGF-MD: behavior rule specification-based distributed misbehavior detection of embedded IoT devices in a closed-loop smart greenhouse farming system

PV Astillo, J Kim, V Sharma, I You - IEEE Access, 2020 - ieeexplore.ieee.org
Smart farming is rapidly revolutionizing the agricultural sector where embedded Internet of
Things (IoT) devices are integrated into the field to maintain or improve the quality of …

A fault and intrusion tolerance framework for containerized environments: A specification-based error detection approach

T Madi, P Esteves-Verissimo - 2022 International Workshop on …, 2022 - ieeexplore.ieee.org
Container-based virtualization has gained momentum over the past few years thanks to its
lightweight nature and support for agility. However, its appealing features come at the price …

ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications

M Al-Ambusaidi, Z Yinjun, Y Muhammad, A Yahya - Soft Computing, 2024 - Springer
Abstract The Internet of Things (IoT) and machine learning (ML) have various applications in
different sectors of life, such as healthcare, agriculture, industries, transportation, smart …

SMDFbs: Specification-Based Misbehavior Detection for False Base Stations

H Park, PVB Astillo, Y Ko, Y Park, T Kim, I You - Sensors, 2023 - mdpi.com
The advancement of cellular communication technology has profoundly transformed human
life. People can now watch high-definition videos anytime, anywhere, and aim for the …

Harmony search Hawks optimization-based Deep reinforcement learning for intrusion detection in IoT using nonnegative matrix factorization

PG Om Prakash, B Maram, G Nalinipriya… - International Journal of …, 2021 - World Scientific
With the advent of the Internet of Things (IoT), the security of the network layer in IoT is
getting more attention in recent decades. Various intrusion detection methods were …

Fingerprint defender: defense against browser-based user tracking

D Moad, V Sihag, G Choudhary, DG Duguma… - … Symposium on Mobile …, 2021 - Springer
It is difficult to be anonymous online with user activities always under the scanner. Multiple
identifiers and their combinatories are used for user identification. While browsing, trackers …

Safeguarding unmanned aerial systems: An approach for identifying malicious aerial nodes

MA Sayeed, R Kumar, V Sharma - IET Communications, 2020 - Wiley Online Library
The coordination between aerial and ground nodes has enhanced the versatility and quality
of the traditional networks. The application of aerial systems in mission‐critical operations …