Bi-level Flow Based Anomalous Activity Identification System for IoT Devices

MR Babu, KN Veena - Journal of Mobile Multimedia, 2022 - journals.riverpublishers.com
With the advanced technologies, IoT has widely emerged with data collection, processing,
and communication as well in smart applications. The wireless medium in the IoT devices …

[HTML][HTML] 2 Literature Survey

PM Rekha, NH Shahapure, M Punitha, PR Sudha - journals.riverpublishers.com
The existing techniques of intrusion detection in IoT and its limitations are deliberated below:
Nadia Chaabouni et al.[1] devised IDS for IoT security. This framework employed the …

A multi-user multi-operator computing pricing method for Internet of things based on bi-level optimization

W Jiang, H Wang, B Li, H Lv… - International Journal of …, 2020 - journals.sagepub.com
The Internet of mobile things is a promising paradigm that generates, stores, and processes
amount of real-time data to render rich services for mobile users. Along with the increase of …

[PDF][PDF] Deep learning-based Internet of Things intrusion detection

WM Abed - researchgate.net
A number of models use deep learning to find new ways to infiltrate more secure networks
and identify Internet of Things (IoT) attacks. The nature of IoT data and its growing …

An Intrusion Detection System for WSN Layer of IOT

DB Roy, R Chaki - Security in IoT, 2022 - taylorfrancis.com
Internet of Things (IoT) consists of a complex interconnection of different types of networks.
There is no single solution to the security threats faced by each layer of the IoT network. In …

An Overview of Latest Alleviate Mechanisms to Counteract Misbehavior Attack in Ad Hoc Networks

R Priya, N Sivakumar - 2020 Second International Conference …, 2020 - ieeexplore.ieee.org
An adhoc network is a group of mobile nodes that communicates through a wireless medium
over another node. It is remained supremacy over the years since there is no demand for the …

[PDF][PDF] A Review and Classification of Intrusion Detection System in Data Engineering

N Majeed, R Priya - academia.edu
Network revolution is an integral component of connectivity. The network risks have also
increased from the latest developments of the internet. The conventional firewall methods …

[PDF][PDF] Reliability of Autonomous IoT Systems with Intrusion Detection Attack-Defense Game Design

DC Wang, R Chen, H Al-Hamadi - people.cs.vt.edu
In this paper we develop an intrusion detection attack-defense game for IoT systems for
which autonomous IoT devices collaboratively solve a problem. We develop an analytical …

[引用][C] Design, Implementation, and Evaluation of Cyber-Physical Ubiquitous Cycling Based on Internet of Things Technologies

LW Chen, CC Tsao