Review of security issues in Internet of Things and artificial intelligence‐driven solutions

AK Abed, A Anupam - Security and Privacy, 2023 - Wiley Online Library
Abstract Internet of Things (IoT) is a network of several hardware and software systems
which is broadly based upon internet services and several state‐of‐the‐art sensing and …

[HTML][HTML] A comprehensive and systematic literature review on the big data management techniques in the internet of things

A Naghib, N Jafari Navimipour, M Hosseinzadeh… - Wireless …, 2023 - Springer
Abstract The Internet of Things (IoT) is a communication paradigm and a collection of
heterogeneous interconnected devices. It produces large-scale distributed, and diverse data …

Safeguarding FinTech innovations with machine learning: Comparative assessment of various approaches

N Mirza, M Elhoseny, M Umar, N Metawa - Research in International …, 2023 - Elsevier
Protecting data is paramount to the development of FinTech. Fraudulent activities can exploit
weaknesses in FinTech systems, wreaking havoc on both customers and service providers …

[HTML][HTML] Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network

D Mishra, B Naik, J Nayak, A Souri, PB Dash… - Digital Communications …, 2023 - Elsevier
In this paper, an advanced and optimized Light Gradient Boosting Machine (LGBM)
technique is proposed to identify the intrusive activities in the Internet of Things (IoT) …

A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities

D Levshun, I Kotenko - Artificial Intelligence Review, 2023 - Springer
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …

Kalis2. 0-a SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for the IoT

A Rullo, D Midi, A Mudjerikar… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The wide variety of application domains makes the Internet of Things (IoT) quite unique
among other types of computer networks: IoT networks can be made of devices of different …

[HTML][HTML] Machine learning and deep learning approaches in IoT

A Javed, M Awais, M Shoaib, KS Khurshid… - PeerJ Computer …, 2023 - peerj.com
The internet is a booming sector for exchanging information because of all the gadgets in
today's world. Attacks on Internet of Things (IoT) devices are alarming as these devices …

[PDF][PDF] Подсистема предупреждения компьютерных атак на объекты критической информационной инфраструктуры: анализ функционирования и …

ИВ Котенко, ИБ Саенко, РИ Захарченко… - Вопросы …, 2023 - cyberrus.info
Вопросы кибербезопасности. 2023. № 1 (53) вание реализации функций
предупреждения компьютерных на базе технологии построения SIEM-систем и …

Аналитический обзор подходов к обнаружению вторжений, основанных на федеративном обучении: преимущества использования и открытые задачи

ЕС Новикова, ЕВ Федорченко, ИВ Котенко… - Информатика и …, 2023 - mathnet.ru
Для обеспечения точного и своевременного реагирования на различные типы атак
системы обнаружения вторжений собирают и анализируют большое количество …

AIML‐Based Blockchain Solutions for IoMT

R Khurana, M Choudhary, A Singh… - Blockchain and Deep …, 2023 - Wiley Online Library
The ongoing increase in urbanization has required the social, ecological, and monetary
advancement of urban areas in order to fundamentally upgrade living conditions. The …