A comprehensive survey of cybersecurity threats, attacks, and effective countermeasures in Industrial Internet of things

AM Alnajim, S Habib, M Islam, SM Thwin, F Alotaibi - Technologies, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) ecosystem faces increased risks and vulnerabilities
due to adopting Industry 4.0 standards. Integrating data from various places and converging …

A deep learning integrated blockchain framework for securing industrial IoT

A Aljuhani, P Kumar, R Alanazi… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is a collection of interconnected smart sensors and
actuators with industrial software tools and applications. IIoT aims to enhance manufacturing …

Numerical feature selection and hyperbolic tangent feature scaling in machine learning-based detection of anomalies in the computer network behavior

D Protić, M Stanković, R Prodanović, I Vulić… - Electronics, 2023 - mdpi.com
Anomaly-based intrusion detection systems identify the computer network behavior which
deviates from the statistical model of typical network behavior. Binary classifiers based on …

Towards a generalized hybrid deep learning model with optimized hyperparameters for malicious traffic detection in the Industrial Internet of Things

B Babayigit, M Abubaker - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
Detecting malicious attacks in Industrial Internet of Things (IIoT) is crucial to minimize
downtime and financial losses. However, existing deep learning (DL) research faces …

[PDF][PDF] Intelligent Intrusion Detection System for the Internet of Medical Things Based on Data-Driven Techniques.

O Taouali, S Bacha, K Ben Abdellafou… - … Systems Science & …, 2023 - cdn.techscience.cn
Introducing IoT devices to healthcare fields has made it possible to remotely monitor
patients' information and provide a proper diagnosis as needed, resulting in the Internet of …

[PDF][PDF] AI-Infused Threat Detection and Incident Response in Cloud Security

S Tatineni - International Journal of Science and Research (IJSR), 2023 - academia.edu
With the evolving sophisticated attack techniques and cyber-attacks, businesses must adapt
their threat detection and response mechanisms. It is paramount to explorecontemporary …

[PDF][PDF] Intelligent Intrusion Detection for Industrial Internet of Things Using Clustering Techniques.

N Alenezi, A Aljuhani - Computer Systems Science & …, 2023 - cdn.techscience.cn
The rapid growth of the Internet of Things (IoT) in the industrial sector has given rise to a new
term: the Industrial Internet of Things (IIoT). The IIoT is a collection of devices, apps, and …

IDS-Chain: a collaborative intrusion detection framework empowered blockchain for internet of medical things

A Aljuhani - 2022 IEEE Cloud Summit, 2022 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) has been integrated and deployed in the health care
domain as it significantly facilitates medical services for both health care providers and …

Self-supervised variational graph autoencoder for system-level anomaly detection

L Zhang, W Cheng, J Xing, X Chen… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Unsupervised anomaly detection (AD) methods, either reconstruction based or prediction
based, determine anomalies based on residuals. Occasional mutations in a single variable …

CTSF: An Intrusion Detection Framework for Industrial Internet Based on Enhanced Feature Extraction and Decision Optimization Approach

G Chai, S Li, Y Yang, G Zhou, Y Wang - Sensors, 2023 - mdpi.com
The traditional Transformer model primarily employs a self-attention mechanism to capture
global feature relationships, potentially overlooking local relationships within sequences …