[HTML][HTML] Network optimizations in the Internet of Things: A review

NN Srinidhi, SMD Kumar, KR Venugopal - Engineering Science and …, 2019 - Elsevier
The Internet was initially used to transfer data packets between users and data sources with
a specific IP address. Due to advancements, the Internet is being used to share data among …

Intrusion detection systems: A cross-domain overview

LN Tidjon, M Frappier… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …

The privacy implications of cyber security systems: A technological survey

E Toch, C Bettini, E Shmueli, L Radaelli… - ACM Computing …, 2018 - dl.acm.org
Cyber-security systems, which protect networks and computers against cyber attacks, are
becoming common due to increasing threats and government regulation. At the same time …

Internet attacks and intrusion detection system: A review of the literature

R Singh, H Kumar, RK Singla, RR Ketti - Online Information Review, 2017 - emerald.com
Purpose The paper addresses various cyber threats and their effects on the internet. A
review of the literature on intrusion detection systems (IDSs) as a means of mitigating …

Evaluating insider threat detection workflow using supervised and unsupervised learning

DC Le, AN Zincir-Heywood - 2018 IEEE Security and Privacy …, 2018 - ieeexplore.ieee.org
Insider threat is a prominent cyber-security danger faced by organizations and companies.
In this research, we study and evaluate an insider threat detection workflow using …

Bio-inspired network security for 5G-enabled IoT applications

K Saleem, GM Alabduljabbar, N Alrowais… - IEEE …, 2020 - ieeexplore.ieee.org
Every IPv6-enabled device connected and communicating over the Internet forms the
Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform …

A distributed architecture for DDoS prediction and bot detection

BM Rahal, A Santos, M Nogueira - IEEE Access, 2020 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks disrupt servers, services and the network,
overloading the target resources and denying normal traffic. In order to defend from this …

Discovering anomalies in big data: a review focused on the application of metaheuristics and machine learning techniques

C Cavallaro, V Cutello, M Pavone, F Zito - Frontiers in Big Data, 2023 - frontiersin.org
With the increase in available data from computer systems and their security threats, interest
in anomaly detection has increased as well in recent years. The need to diagnose faults and …

A Review of Network Optimization on the Internet of Things

A Srivastava, A Kumar - Innovations in Computer Science and Engineering …, 2022 - Springer
The Internet was initially accustomed to transmitting packets of data between users and data
sources using a specified IP address. The Internet of things (IoT) is the concept of everyday …

The HiPEAC Vision 2019

M Duranton, K De Bosschere, B Coppens, C Gamrat… - 2019 - inria.hal.science
The current surge of attention around artificial intelligence will hopefully lead to seeking
solutions that help increase efficiency, quality and designer productivity for both hardware …