Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML

RU Rasool, HF Ahmad, W Rafique, A Qayyum… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Medical Things (IoMT) supports traditional healthcare systems by
providing enhanced scalability, efficiency, reliability, and accuracy of healthcare services. It …

Adversarial machine learning for network intrusion detection: A comparative study

H Jmila, MI Khedher - Computer Networks, 2022 - Elsevier
Intrusion detection is a key topic in cybersecurity. It aims to protect computer systems and
networks from intruders and malicious attacks. Traditional intrusion detection systems (IDS) …

Defense strategies for adversarial machine learning: A survey

P Bountakas, A Zarras, A Lekidis, C Xenakis - Computer Science Review, 2023 - Elsevier
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …

[HTML][HTML] The digital harms of smart home devices: A systematic literature review

D Buil-Gil, S Kemp, S Kuenzel, L Coventry… - Computers in Human …, 2023 - Elsevier
The connection of home electronic devices to the internet allows remote control of physical
devices and involves the collection of large volumes of data. With the increase in the uptake …

FGMD: A robust detector against adversarial attacks in the IoT network

H Jiang, J Lin, H Kang - Future Generation Computer Systems, 2022 - Elsevier
Since network intrusion detectors for the Internet of Things (IoT) increasingly rely on
machine learning models, attacks against these detectors are also escalating. Machine …

[HTML][HTML] Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication

AS Mohammed, E Anthi, O Rana, N Saxena… - Computers & …, 2023 - Elsevier
Abstract Industrial Cyber-Physical Systems (ICPS) are highly dependent on Supervisory
Control and Data Acquisition (SCADA) for process monitoring and control. Such SCADA …

Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications

MM Rashid, J Kamruzzaman, MM Hassan, T Imam… - Computers & …, 2022 - Elsevier
Abstract Intrusion Detection Systems (IDS) based on deep learning models can identify and
mitigate cyberattacks in IoT applications in a resilient and systematic manner. These models …

[HTML][HTML] Adversarial machine learning in IoT from an insider point of view

F Aloraini, A Javed, O Rana, P Burnap - Journal of Information Security and …, 2022 - Elsevier
With the rapid progress and significant successes in various applications, machine learning
has been considered a crucial component in the Internet of Things ecosystem. However …

Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems

Y Liu, L Xu, S Yang, D Zhao, X Li - Computers & Security, 2024 - Elsevier
The challenge faced by industrial control systems is that they are vulnerable to adversarial
sample attacks. In the ICS field, the challenge with adversarial sample attacks is that the …

A holistic review of machine learning adversarial attacks in IoT networks

H Khazane, M Ridouani, F Salahdine, N Kaabouch - Future Internet, 2024 - mdpi.com
With the rapid advancements and notable achievements across various application
domains, Machine Learning (ML) has become a vital element within the Internet of Things …