Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

An emerging threat Fileless malware: a survey and research challenges

Sudhakar, S Kumar - Cybersecurity, 2020 - Springer
With the evolution of cybersecurity countermeasures, the threat landscape has also evolved,
especially in malware from traditional file-based malware to sophisticated and multifarious …

CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques

M Shafiq, Z Tian, AK Bashir, X Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city

M Shafiq, Z Tian, Y Sun, X Du, M Guizani - Future Generation Computer …, 2020 - Elsevier
Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in
smart city. Recently, the research community in the field of IoT Security endeavor hard to …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

A distributed deep learning system for web attack detection on edge devices

Z Tian, C Luo, J Qiu, X Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …

An edge-AI based forecasting approach for improving smart microgrid efficiency

L Lv, Z Wu, L Zhang, BB Gupta… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Smart Grid 2.0 is the energy Internet based on advanced metering infrastructure and
distributed systems that require an instantaneous two-way flow of energy information. Edge …

Block-DEF: A secure digital evidence framework using blockchain

Z Tian, M Li, M Qiu, Y Sun, S Su - Information Sciences, 2019 - Elsevier
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …

IoT malicious traffic identification using wrapper-based feature selection mechanisms

M Shafiq, Z Tian, AK Bashir, X Du, M Guizani - Computers & Security, 2020 - Elsevier
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …

UAV-enhanced intelligent offloading for Internet of Things at the edge

H Guo, J Liu - IEEE Transactions on Industrial Informatics, 2019 - ieeexplore.ieee.org
With the explosive growth of diverse Internet of Things (IoT) applications, mobile edge
computing (MEC) has been brought to settle the conflict between computation-intensive …