Machine learning and deep learning techniques for internet of things network anomaly detection—current research trends

SH Rafique, A Abdallah, NS Musa, T Murugan - Sensors, 2024 - mdpi.com
With its exponential growth, the Internet of Things (IoT) has produced unprecedented levels
of connectivity and data. Anomaly detection is a security feature that identifies instances in …

Securing internet of things using machine and deep learning methods: a survey

A Ghaffari, N Jelodari, S pouralish, N derakhshanfard… - Cluster …, 2024 - Springer
Abstract The Internet of Things (IoT) is a vast network of devices with sensors or actuators
connected through wired or wireless networks. It has a transformative effect on integrating …

Detection of DoS Attacks for IoT in Information-Centric Networks Using Machine Learning: Opportunities, Challenges, and Future Research Directions

R Bukhowah, A Aljughaiman, MMH Rahman - Electronics, 2024 - mdpi.com
The Internet of Things (IoT) is a rapidly growing network that shares information over the
Internet via interconnected devices. In addition, this network has led to new security …

[PDF][PDF] TRANSFORMING HEALTHCARE WITH FEDERATED LEARNING: SECURING FOG SYSTEMS FOR THE NEXT GENERATION

T ALKHDOUR, A ALI, M ALMAIAH, TTIN TIN… - Journal of Theoretical …, 2024 - jatit.org
Recent advancements in fog computing, coupled with the Internet of Things (IoT)
technology, encompass data analysis and artificial intelligence (AI) systems. Nonetheless …

[PDF][PDF] UNLOCKING USER PRIVACY: A PRIVACY-FOCUSED CRYPTOCURRENCIES FRAMEWORK FOR CONCEALING TRANSACTIONS USING ZERO …

MA ALMAIAH, A ALI, TTIN TIN, T ALKHDOUR… - Journal of Theoretical …, 2024 - jatit.org
In the era of digital transactions and decentralized cryptocurrencies, ensuring user privacy
has become a paramount concern. This abstract presents a groundbreaking framework …

[PDF][PDF] REAL TIME OF CYBERSECURITY RISKS DETECTION APPROACH FOR BLOCKCHAIN BASED PERSONAL MEDICAL DEVICES

T ALKHDOUR, AA MOHAMMED, ALI AITIZAZ… - Journal of Theoretical …, 2024 - jatit.org
Recent methods for storing and disseminating medical data limit user access to electronic
health records (EHR). It lowers care providers' access to vital information and ultimately …

[PDF][PDF] A HYBRID MODEL OF RSA AND NTRU FOR SECURING OF CLOUD COMPUTING

K ALTARAWNEH, I ALTARAWNI… - Journal of Theoretical …, 2024 - researchgate.net
Cryptographic techniques are essential in guaranteeing the security and confidentiality of
data in cloud computing, which is a critical concern. In order to provide a strong and secure …

Deep Learning Based Network intrusion detection for unmanned aerial vehicle (UAV)

W Ahmad, MA Almaiah, A Ali… - 2024 7th World …, 2024 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) have witnessed significant growth in various
applications, including surveillance, reconnaissance, and data collection. However, the …

Securing Web Data and Privacy in AIoT Systems

MI Mihailescu, SL Nita - … and Applications in Artificial Intelligence of …, 2024 - igi-global.com
The exponential growth of Artificial Intelligence of Things (AIoT) has resulted in an
unparalleled fusion of AI with IoT technologies, giving rise to intricate systems that present …

Cyber Threat Intelligence Based Resource Allocation Model for Ioe-Edge

SU Jamil, MA Khan - Available at SSRN 4781053 - papers.ssrn.com
Wireless communication and the Internet of EveryThings (IoE) have revolutionised modern
technology, emphasising the criticalneed for effective resource allocation to optimise system …