Transfer learning approach to IDS on cloud IoT devices using optimized CNN

OD Okey, DC Melgarejo, M Saadi, RL Rosa… - IEEE …, 2023 - ieeexplore.ieee.org
Data centralization can potentially increase Internet of Things (IoT) usage. The trend is to
move IoT devices to a centralized server with higher memory capacity and a more robust …

Intrusion detection using optimized ensemble classification in fog computing paradigm

MP Ramkumar, T Daniya, PM Paul… - Knowledge-Based …, 2022 - Elsevier
Fog computing is a framework, which expands services of the cloud to network for
addressing inherent issues of the cloud. Intrusion Detection Systems (IDSs) represent a …

Secure framework for IoT applications using Deep Learning in fog Computing

A Chakraborty, M Kumar, N Chaurasia - Journal of Information Security and …, 2023 - Elsevier
An efficient offloading strategy provides a promising solution to latency-sensitive
applications in a cloud fog environment, but the fog computing environment is not fully …

[HTML][HTML] Enhanced chimp optimization-based feature selection with fuzzy logic-based intrusion detection system in cloud environment

MA Alohali, M Elsadig, FN Al-Wesabi, M Al Duhayyim… - Applied Sciences, 2023 - mdpi.com
Cloud computing (CC) refers to an Internet-based computing technology in which shared
resources, such as storage, software, information, and platform, are offered to users on …

[HTML][HTML] Toward generating a new cloud-based Distributed Denial of Service (DDoS) dataset and cloud intrusion traffic characterization

MM Shafi, AH Lashkari, V Rodriguez, R Nevo - Information, 2024 - mdpi.com
The distributed denial of service attack poses a significant threat to network security. Despite
the availability of various methods for detecting DDoS attacks, the challenge remains in …

Securing the digital frontier: Strategies for cloud computing security, database protection, and comprehensive penetration testing

UTGI Igwenagu, AA Salami… - Journal of …, 2024 - eprints.go4mailburst.com
This research paper explores the effectiveness of integrated cybersecurity strategies,
focusing on the amalgamation of cloud computing security, database protection, and …

Machine Learning Methods of IoT Security and Future Application: Machine Learning Methods of IoT Security and Future Application

A Ali, S Naeem, S Anam, MM Ahmed - Proceedings of the Pakistan …, 2022 - ppaspk.org
One of the technologies that are now expanding rapidly is called the Internet of Things (IoT).
It is a technology that enables billions of smart devices or things, collectively referred to as …

[HTML][HTML] A Deep Learning Approach for Securing IoT Infrastructure with Emphasis on Smart Vertical Networks

M Kolhar, SM Aldossary - Designs, 2023 - mdpi.com
As a result of the Internet of Things (IoT), smart city infrastructure has been able to advance,
enhancing efficiency and enabling remote management. Despite this, this interconnectivity …

Seagull Optimization-based Feature Selection with Optimal Extreme Learning Machine for Intrusion Detection in Fog Assisted WSN

T Muthu, VK Kalimuthu - Tehnički vjesnik, 2023 - hrcak.srce.hr
Sažetak On the internet, various devices that are connected to the Internet of Things (IoT)
and Wireless Sensor Networks (WSNs) share the resources that they have in accordance …

[HTML][HTML] A collaborative and adaptive cyber défense strategic assessment for healthcare networks using edge computing

K Baranitharan, V Dineshbabu… - Healthcare …, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a massive network connecting various devices and
computer systems. This technology makes prototyping and distributing cutting-edge software …