An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with …

MA Setitra, M Fan… - Transactions on Emerging …, 2023 - Wiley Online Library
The growing popularity of Software Defined Networks (SDN) and the Internet of Things (IoT)
has led to the emergence of Software Defined Internet of Things (SDIoT) based on …

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey

M Humayun, N Tariq, M Alfayad, M Zakwan… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has revolutionized various domains, enabling interconnected
devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in …

[PDF][PDF] Comprehensive Survey on AI-Based Technologies for Enhancing IoT Privacy and Security: Trends, Challenges, and Solutions

OEL Castro, X Deng, JH Park - HUMAN-CENTRIC COMPUTING AND …, 2023 - hcisj.com
Abstract The Internet of Things (IoT) is revolutionizing modern technology by connecting
numerous devices and applications. However, its lack of standardization has led to security …

[HTML][HTML] An efficient artificial intelligence approach for early detection of cross-site scripting attacks

F Younas, A Raza, N Thalji, L Abualigah, RA Zitar… - Decision Analytics …, 2024 - Elsevier
Abstract Cross-Site Scripting (XSS) attacks continue to pose a significant threat to web
applications, compromising the security and integrity of user data. XSS is a web application …

A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)

VE Quincozes, SE Quincozes, JF Kazienko… - International Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) plays a fundamental role in contemporary society,
necessitating an in-depth comprehension of its application layer protocols, intertwined …

Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods

Y Wei, J Jang-Jaccard, A Singh, F Sabrina… - arXiv preprint arXiv …, 2023 - arxiv.org
DDoS attacks involve overwhelming a target system with a large number of requests or
traffic from multiple sources, disrupting the normal traffic of a targeted server, service, or …

IoT Security Detection Method Based on Multifeature and Multineural Network Fusion

Z Zhu, L Zhang, J Liu, X Ying - Security and Communication …, 2023 - Wiley Online Library
IoT security detection plays an important role in securing the IoT ecosystem. The current
detection systems suffer from poor fault tolerance and inefficient detection results. To …

AIoMT Enabling Real-Time Monitoring of Healthcare Systems: Security and Privacy Considerations

JB Awotunde, AL Imoize, RG Jimoh… - Handbook of Security …, 2024 - taylorfrancis.com
One key element determining a person's living standards is access to adequate and high-
quality healthcare services. Developed nations work to make their healthcare systems as …

Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection

CS Kalutharage, X Liu, C Chrysoulas… - European Symposium on …, 2023 - Springer
Abstract As Internet of Things (IoT) networks continue to expand, it has become increasingly
crucial to safeguard the security of these interconnected devices. This research study …

Evaluation of XAI Algorithms in IoT Traffic Anomaly Detection

U Do, L Lahesoo, RM Carnier… - … Conference on Artificial …, 2024 - ieeexplore.ieee.org
Anomaly detection in network traffic, both in general computer networks and specifically in
Internet of Things (IoT) networks, plays a crucial role in ensuring computer network security …