An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks

R Kumar, A Malik, V Ranga - Knowledge-Based Systems, 2022 - Elsevier
Smart devices are connected to the internet, called the Internet of Things (IoT); it is a
wireless network that plays a vital role in modernizing people's interaction by improving …

Behaviot: Measuring smart home iot behavior using network-inferred behavior models

T Hu, DJ Dubois, D Choffnes - Proceedings of the 2023 ACM on Internet …, 2023 - dl.acm.org
Smart home IoT platforms are typically closed systems, meaning that there is poor visibility
into device behavior. Understanding device behavior is important not only for determining …

Who's controlling my device? Multi-user multi-device-aware access control system for shared smart home environment

AK Sikder, L Babun, ZB Celik, H Aksu… - ACM Transactions on …, 2022 - dl.acm.org
Multiple users have access to multiple devices in a smart home system–typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …

Hades-iot: A practical and effective host-based anomaly detection system for iot devices (extended version)

D Breitenbacher, I Homoliak, YL Aung… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices have become ubiquitous, with applications in many domains,
including industry, transportation, and healthcare; these devices also have many household …

[PDF][PDF] The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments.

L Babun, AK Sikder, A Acar, AS Uluagac - NDSS, 2022 - ndss-symposium.org
In smart environments such as smart homes and offices, the interaction between devices,
users, and apps generate abundant data. Such data contain valuable forensic information …

A Closer Look at Access Control in Multi-User Voice Systems

HA Shafei, CC Tan - IEEE Access, 2024 - ieeexplore.ieee.org
Voice-controlled systems have revolutionized user interactions, making technology more
accessible and intuitive across various settings. In multi-user environments, such as …

ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security

K Mukherjee, J Wiedemeier, Q Wang… - … Conference on Applied …, 2024 - Springer
Abstract Internet of Things (IoT) devices have increased drastically in complexity and
prevalence within the last decade. Alongside the proliferation of IoT devices and …

Design of a quality of service‐aware fault‐proof secure Q‐learning‐based Internet of Things kernel patch with multipath and multichannel capabilities

S Vijayrao Shankhpal… - International Journal of …, 2022 - Wiley Online Library
In recent times, the expeditious growth of Internet of Things (IoT) offers applications to ease
day‐to‐day activities with minimum human effort. Once the IoT application installed, the …

Evaluation of Kernel-Level IoT Security and QoS Aware Models from an Empirical Perspective

BS Dhak, PL Ramteke - International Conference on Communication …, 2021 - Springer
Abstract Internet of Things (IoT) based devices have proven to be highly useful during this
pandemic. From home automation to industrial monitoring, these devices have become an …

[HTML][HTML] Security and privacy concerns in assisted living environments

PA Condado, FG Lobo - Journal of Smart Cities and Society, 2023 - content.iospress.com
Assisted living environments use interconnected devices to assist people with limitations in
performing daily activities. In these environments, human activity recognition is critical for …