A holistic review of machine learning adversarial attacks in IoT networks

H Khazane, M Ridouani, F Salahdine, N Kaabouch - Future Internet, 2024 - mdpi.com
With the rapid advancements and notable achievements across various application
domains, Machine Learning (ML) has become a vital element within the Internet of Things …

Evasion Attack and Defense On Machine Learning Models in Cyber-Physical Systems: A Survey

S Wang, RKL Ko, G Bai, N Dong… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are increasingly relying on machine learning (ML)
techniques to reduce labor costs and improve efficiency. However, the adoption of ML also …

[HTML][HTML] Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring

I Zakariyya, H Kalutarage, MO Al-Kadri - Computers & Security, 2023 - Elsevier
Abstract The application of Deep Neural Networks (DNNs) for monitoring cyberattacks in
Internet of Things (IoT) systems has gained significant attention in recent years. However …

[HTML][HTML] Numerical feature selection and hyperbolic tangent feature scaling in machine learning-based detection of anomalies in the computer network behavior

D Protić, M Stanković, R Prodanović, I Vulić… - Electronics, 2023 - mdpi.com
Anomaly-based intrusion detection systems identify the computer network behavior which
deviates from the statistical model of typical network behavior. Binary classifiers based on …

An exploratory analysis of effect of adversarial machine learning attack on IoT-enabled industrial control systems

S Trivedi, TA Tran, N Faruqui… - … Conference on Smart …, 2023 - ieeexplore.ieee.org
Machine Learning (ML)-based Intrusion Detection Systems (IDS) is an effective technology
to automatically detect cyber attacks in the Internet of Things (IoT) dependent Industrial …

Artificial intelligence: revolutionizing cyber security in the digital era

S Kumar, U Gupta, AK Singh, AK Singh - Journal of Computers …, 2023 - jcmm.co.in
As we navigate the digital era of the 21st century, cyber security has grown into a pressing
societal issue that requires innovative, cutting-edge solutions. In response to this pressing …

An investigation of energy consumption in fused deposition modelling using ESP32 IoT monitoring system

S Zakaria, P Mativenga, EARE Ariff - Procedia CIRP, 2023 - Elsevier
Energy price and availability have become an urgent global challenge. Manufacturers need
to model and reduce energy consumption and cost. To enable energy smart manufacturing …

[HTML][HTML] Adversarial Attacks on Intrusion Detection Systems in In-Vehicle Networks of Connected and Autonomous Vehicles

F Aloraini, A Javed, O Rana - Sensors, 2024 - mdpi.com
Rapid advancements in connected and autonomous vehicles (CAVs) are fueled by
breakthroughs in machine learning, yet they encounter significant risks from adversarial …

A trust-centric approach to intrusion detection in edge networks for medical internet of thing Ecosystems

G Nagarajan, M Margala, P Chakrabarti… - Computers and Electrical …, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) promises transformative benefits for patient
care and remote monitoring but raises significant security and privacy concerns. Ensuring …

Pengembangan Auto-AI Model Generatif Analisis Kompleksitas Waktu Algoritma untuk Data Multi-Sensor IoT Pada Node-Red Menggunakan Extreme Learning …

I Cholissodin, D Syauqy, DA Firmanda, I Aji… - … Informasi dan Ilmu …, 2022 - jtiik.ub.ac.id
Awal mulanya, algoritma hanya dipakai untuk solusi penyelesaian persamaan matematika
sederhana, seperti aljabar, aritmatika, probabilitas, dan lainnya yang lebih banyak …