Trust‐based attack and defense in wireless sensor networks: a survey

W Fang, W Zhang, W Chen, T Pan… - … and Mobile Computing, 2020 - Wiley Online Library
As a key component of the information sensing and aggregating for big data, cloud
computing, and Internet of Things (IoT), the information security in wireless sensor network …

[HTML][HTML] A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks

O Alkadi, N Moustafa, B Turnbull… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
There has been significant research in incorporating both blockchain and intrusion detection
to improve data privacy and detect existing and emerging cyberattacks, respectively. In …

Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments

W Li, W Meng, MH Au - Journal of Network and Computer Applications, 2020 - Elsevier
Collaborative intrusion detection systems (CIDSs) are developing to improve the detection
performance of a single detector in Internet of Things (IoT) networks, through exchanging …

A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

Towards multiple-mix-attack detection via consensus-based trust management in IoT networks

Z Ma, L Liu, W Meng - Computers & Security, 2020 - Elsevier
With the rapid development of Internet of Things (IoT), various smart devices can work
collaboratively and construct a kind of multihop IoT network. However, due to the distributed …

Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

W Meng, W Li, Y Wang, MH Au - Future Generation Computer Systems, 2020 - Elsevier
Cyber–physical systems (CPS) have been widely used in medical domains to provide high-
quality patient treatment in complex clinical scenarios. With more medical devices being …

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

W Meng, W Li, LT Yang, P Li - International Journal of Information Security, 2020 - Springer
Due to the rapid growth of computer networks, intrusions have become more complicated
and devastating. As an important solution, collaborative intrusion detection networks or …

Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities

W Meng, W Li, S Tug, J Tan - Journal of parallel and distributed computing, 2020 - Elsevier
With the increasing viability of Internet of Things (IoT), more devices are expected to be
connected in a smart city environment. It can provide many benefits for people's daily life, but …

DCONST: Detection of multiple-mix-attack malicious nodes using consensus-based trust in IoT networks

Z Ma, L Liu, W Meng - Information Security and Privacy: 25th Australasian …, 2020 - Springer
Abstract The Internet of Things (IoT) is growing rapidly, which allows many smart devices to
connect and cooperate with each other. While for the sake of distributed architecture, an IoT …