Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology

BK Mohanta, D Jena, U Satapathy, S Patnaik - Internet of Things, 2020 - Elsevier
Abstract Internet of Things (IoT) is one of the most rapidly used technologies in the last
decade in various applications. The smart things are connected in wireless or wired for …

Deep learning and big data technologies for IoT security

MA Amanullah, RAA Habeeb, FH Nasaruddin… - Computer …, 2020 - Elsevier
Technology has become inevitable in human life, especially the growth of Internet of Things
(IoT), which enables communication and interaction with various devices. However, IoT has …

IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges

P Anand, Y Singh, A Selwal, M Alazab, S Tanwar… - IEEE …, 2020 - ieeexplore.ieee.org
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …

Machine learning and big data processing for cybersecurity data analysis

I Kotenko, I Saenko, A Branitskiy - Data science in cybersecurity and …, 2020 - Springer
The chapter presents an approach to cybersecurity data analysis based on the combination
of a set of machine learning methods and Big Data technologies for network attack and …

Applying machine learning and parallel data processing for attack detection in IoT

A Branitskiy, I Kotenko, I Saenko - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) networks are kind of computer networks for which the problem of
information security and, in particular, computer attack detection is acute. For solving this …

A Novel Scheme for Improving Accuracy of KNN Classification Algorithm Based on the New Weighting Technique and Stepwise Feature Selection

S Sheikhi, MT Kheirabadi, A Bazzazi - Journal of Information Technology …, 2020 - jitm.ut.ac.ir
K nearest neighbor algorithm is one of the most frequently used techniques in data mining
for its integrity and performance. Though the KNN algorithm is highly effective in many …

[PDF][PDF] Обнаружение инсайдеров в компьютерных сетях на основе комбинирования экспертных правил, методов машинного обучения и обработки больших …

ИА Ушаков - 2020 - spiiras.nw.ru
Защита состоится 28 апреля 2020 г. в 14: 00 часов на заседании диссертационного
совета по защите диссертаций на соискание ученой степени кандидата наук, на …

[PDF][PDF] Big Data Security

M Dener - ENGINEERING AND ARCHITECTURE SCIENCES, 2020 - avesis.itu.edu.tr
As technology and electronic media develop and spread, the size of the data increases.
According to the researches, all the data obtained in the past years are much less than the …

A Trust-Based Security Research Method for Internet of Things Terminal

Z Liu, B Zhao, J Li - Trusted Computing and Information Security: 13th …, 2020 - Springer
The Internet of things has a broad application prospect, but under the environment of the
Internet of things, terminals are facing extremely serious security threats. The existing …

МЕТОДЫ ОБНАРУЖЕНИЯ КОМПЬЮТЕРНЫХ АТАК В СЕТЯХ С ВЫСОКОЙ НАГРУЗКОЙ

НА Комашинский, ИВ Котенко - … в науке и образовании (АПИНО 2020), 2020 - elibrary.ru
Рассматриваются проблема построения современных систем обнаружения атак в
сетях с большим объемом трафика. Описываются основные методы обнаружения атак …