[HTML][HTML] smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks

SI Popoola, B Adebisi, R Ande, M Hammoudeh… - Sensors, 2021 - mdpi.com
Nowadays, hackers take illegal advantage of distributed resources in a network of
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …

[HTML][HTML] Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things

V Akshaya, V Mandala, C Anilkumar, P VishnuRaja… - Measurement …, 2023 - Elsevier
Exponential increases in smart devices and reduced costs of sensors have increased
applications using IoT (Internet of Things). There has been an extensive analysis on the …

A discrete time-varying greywolf IoT botnet detection system

M Alazab - Computer Communications, 2022 - Elsevier
Internet of things (IoT) is an emerging network that is trending due to advances in computing
and networking development. A botnet is an attack that threatens the IoT system because of …

[HTML][HTML] Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City

NS Alotaibi, HI Ahmed, SOM Kamel - Sensors, 2023 - mdpi.com
The internet of things (IoT) technology presents an intelligent way to improve our lives and
contributes to many fields such as industry, communications, agriculture, etc. Unfortunately …

Cloud intrusion detection model based on deep belief network and grasshopper optimization

V Parganiha, SP Shukla, LK Sharma - International Journal of …, 2022 - igi-global.com
Cloud computing is a vast area which uses the resources cost-effectively. The performance
aspects and security are the main issues in cloud computing. Besides, the selection of …

[图书][B] Adaptive energy saving and mobility support IPv6 routing protocol in low-power and lossy networks for internet of things and wireless sensor networks

AH Gidado - 2022 - search.proquest.com
Abstract Internet of Things (IoT) is an interconnection of physical objects that can be
controlled, monitored and exchange information from remote locations over the internet …

On aggregation and prediction of cybersecurity incident reports

MV Carriegos, ÁLM Castañeda, MT Trobajo… - IEEE …, 2021 - ieeexplore.ieee.org
The study of cybersecurity incidents is an active research field. The purpose of this work is to
determine accurate measures of cybersecurity incidents. An effective method to aggregate …

An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data

S Ray, KN Mishra, S Dutta - Wireless Personal Communications, 2023 - Springer
Abstract Nowadays Mobile Health (also termed as m-Health) is an essential component of
the healthcare sector. The m-healthcare uses different types of digitized devices (laptops …

Leveraging Deep Learning Techniques for Securing the Internet of Things in the Age of Big Data

K Kaushik - … Artificial Intelligence in Cybersecurity Analytics and …, 2024 - Wiley Online Library
There is a growing need for adequate procedures to make sure that smart devices are
resistant to different threats and assaults on the Internet of Things (IoT) ecosystem as they …

Cross-Layer Distributed Attack Detection Model for the IoT

HI Ahmed, AA Nasr, SM Abdel-Mageid… - International Journal of …, 2022 - igi-global.com
IoT is a huge network that contains many objects communicating with each other. It has a
collection of sensitive data which is vulnerable to various threats at different layers. Due to …