[HTML][HTML] An Efficient Flow-Based Anomaly Detection System for Enhanced Security in IoT Networks

I Mutambik - Sensors, 2024 - mdpi.com
The growing integration of Internet of Things (IoT) devices into various sectors like
healthcare, transportation, and agriculture has dramatically increased their presence in …

MFT: A novel memory flow transformer efficient intrusion detection method

X Jiang, L Xu, L Yu, X Fang - Computers & Security, 2025 - Elsevier
Intrusion detection is a critical field in network security research that is devoted to detecting
malicious traffic or attacks on networks. Even with the advances in today's Internet …

[HTML][HTML] Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions

T Zhukabayeva, L Zholshiyeva, N Karabayev, S Khan… - Sensors, 2025 - mdpi.com
This paper provides the complete details of current challenges and solutions in the
cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its …

Device Identification and Anomaly Detection in IoT Environments

M Rabbani, J Gui, F Nejati, Z Zhou… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
As the Internet of Things (IoT) landscape continues to expand, a diverse range of devices
with various functionalities is being integrated into the IoT ecosystem. When traditional …

Edge Implicit Weighting with Graph Transformers for Robust Intrusion Detection in Internet of Things Network

C Karpagavalli, M Kaliappan - Computers & Security, 2024 - Elsevier
In recent years, the Internet of Things devices have progressively deployed in various
applications including smart cities, intelligent transportation, healthcare, and agriculture …

[HTML][HTML] Optimization Scheme of Collaborative Intrusion Detection System Based on Blockchain Technology

J Huang, Y Chen, X Wang, Z Ouyang, N Du - Electronics, 2025 - mdpi.com
In light of the escalating complexity of the cyber threat environment, the role of Collaborative
Intrusion Detection Systems (CIDSs) in reinforcing contemporary cybersecurity defenses is …

SiAD: a traffic generation-based anomaly detection protocol with state improvement for Internet of things using deep learning

SU Haq, AM Abbas - Iran Journal of Computer Science, 2024 - Springer
The behavior of devices connected to an Internet of Things (IoT) needs to be monitored to
identify anomalous nodes. In this paper, we propose a protocol for anomaly detection that …

An improved SSH optimization model for wireless security in Complex networks

S Temara, D Tiwari, A Verma… - 2024 15th …, 2024 - ieeexplore.ieee.org
The SSH (Secure Shell) protocol has been widely utilized for secure and remote access of
devices over a network. However, as wireless networks become more complicated, there is …

Methodology for detecting and countering multi-vector threats to information security of a decentralized IoT system

VI Petrenko, FB Tebueva, MG Ogur, GI Linets… - International Journal of …, 2025 - injoit.org
The paper proposes a methodology for detecting and countering multi-vector information
security threats in decentralized IoT networks. The proposed solution integrates …