[HTML][HTML] A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022 - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

Machine learning approaches to IoT security: A systematic literature review

R Ahmad, I Alsmadi - Internet of Things, 2021 - Elsevier
With the continuous expansion and evolution of IoT applications, attacks on those IoT
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …

A survey of compiler testing

J Chen, J Patra, M Pradel, Y Xiong, H Zhang… - ACM Computing …, 2020 - dl.acm.org
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …

Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges

A Vangala, AK Das, V Chamola, V Korotaev… - Cluster …, 2023 - Springer
Agricultural industry is one of the most vital industries that has a major contribution to the
economy due to its share in the Gross Domestic Product (GDP) and as a source of …

[HTML][HTML] smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks

SI Popoola, B Adebisi, R Ande, M Hammoudeh… - Sensors, 2021 - mdpi.com
Nowadays, hackers take illegal advantage of distributed resources in a network of
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …

[HTML][HTML] Intrusion detection in iot using deep learning

AM Banaamah, I Ahmad - Sensors, 2022 - mdpi.com
Cybersecurity has been widely used in various applications, such as intelligent industrial
systems, homes, personal devices, and cars, and has led to innovative developments that …

ML-DDoS: A blockchain-based multilevel DDoS mitigation mechanism for IoT environments

RF Hayat, S Aurangzeb, M Aleem… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks as well as botnet-based attacks are among the
most important security vulnerabilities in Internet of Things (IoT) environments. Most of the …

[图书][B] How to stay smart in a smart world: Why human intelligence still beats algorithms

G Gigerenzer - 2022 - books.google.com
How to stay in charge in a world populated by algorithms that beat us in chess, find us
romantic partners, and tell us to “turn right in 500 yards.” Doomsday prophets of technology …

A survey on IoT profiling, fingerprinting, and identification

M Safi, S Dadkhah, F Shoeleh, H Mahdikhani… - ACM Transactions on …, 2022 - dl.acm.org
The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet
produces several operational and security challenges, such as monitoring, detecting, and …

Ranking security of IoT-based smart home consumer devices

NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …