V Tomer, S Sharma - Future Internet, 2022 - mdpi.com
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By …
M Arunkumar, K Ashok Kumar - Soft Computing, 2022 - Springer
The increasing development of decentralized computer systems that interact extensively has increased the criticality of confronting cyberattackers, hackers, and terrorists. With the …
S Rathore, JH Park - Applied Soft Computing, 2018 - Elsevier
Alongside the development of Internet of Things (IoT), security attacks are also increasing day by day. A number of centralized attack detection mechanisms have been proposed to …
Cybersecurity continues to be a major issue for all industries engaged in digital activity given the cyclical surge in security incidents. Since more Internet of Things (IoT) devices are being …
S Roy, J Li, Y Bai - Internet of Things, 2022 - Elsevier
Abstract The Internet of Things (IoT) and its applications are becoming ubiquitous in our life. However, the open deployment environment and the limited resources of IoT devices make …
BA NG, S Selvakumar - Future Generation Computer Systems, 2020 - Elsevier
The proliferation of Internet of things (IoT) devices has lured hackers to launch attacks. Therefore, anomalies in IoT traffic must be detected to mitigate these attacks and protect …
Cyber Loopholes in smart devices' applications invited intruders to conduct malicious activities. The growing quantity and diversity of smart devices has posed significant cyber …
KF Hassan, ME Manaa - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
The introduction of a new technology has aided the exponential growth of the internet of things (IoT), allowing for the connecting of more devices in the IoT network to be made …
Fog computing provides a multitude of end‐based IoT system services. End IoT devices exchange information with fog nodes and the cloud to handle client undertakings. During the …