Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions

N Moustafa, N Koroniotis, M Keshk… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The field of Explainable Artificial Intelligence (XAI) has garnered considerable research
attention in recent years, aiming to provide interpretability and confidence to the inner …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

Blockchain-enabled intrusion detection and prevention system of APTs within zero trust architecture

L Alevizos, MH Eiza, VT Ta, Q Shi, J Read - Ieee Access, 2022 - ieeexplore.ieee.org
In a world where organisations are embracing new IT working models such as Bring Your
Own Device (BYOD) and remote working, the traditional mindset of defending the network …

Federated learning based IDS approach for the IoV

A Hbaieb, S Ayed, L Chaari - … of the 17th international conference on …, 2022 - dl.acm.org
The Internet of Vehicles (IoV) is an Internet of Things (IoT) application that offers several
utilities such as traffic analysis, safe driving, road optimization, and travel comfort. Software …

BCTrustFrame: enhancing trust management via blockchain and IPFS in 6G era

W Li, W Meng - IEEE Network, 2022 - ieeexplore.ieee.org
Beginning in 2030, sixth generation (6G) mobile communication is expected to play a key
role by collecting billions of things, humans, and robots, resulting in zettabytes of digital …

Trust-aware fog-based iot environments: artificial reasoning approach

M Ghaleb, F Azzedin - Applied Sciences, 2023 - mdpi.com
Establishing service-driven IoT systems that are reliable, efficient, and stable requires
building trusted IoT environments to reduce catastrophic and unforeseen damages. Hence …

Collaborative anomaly detection system for charging stations

J Cumplido, C Alcaraz, J Lopez - European Symposium on Research in …, 2022 - Springer
In recent years, the deployment of charging infrastructures has been increasing
exponentially due to the high energy demand of electric vehicles, forming complex charging …

Physical assessment of an SDN-based security framework for DDoS attack mitigation: Introducing the SDN-SlowRate-DDoS dataset

NM Yungaicela-Naula, C Vargas-Rosales… - IEEE …, 2023 - ieeexplore.ieee.org
Slow-read Distributed Denial of Service (DDoS) attacks are complex to detect and mitigate.
Although existing tools allow one to identify these attacks, these tools mainly generate alerts …

Towards trustworthy autonomous systems: Taxonomies and future perspectives

F Flammini, C Alcaraz, E Bellini… - … on Emerging Topics …, 2022 - ieeexplore.ieee.org
The class of Trustworthy Autonomous Systems (TAS) includes cyber-physical systems
leveraging on self-x technologies that make them capable to learn, adapt to changes, and …