Incentive techniques for the internet of things: a survey

PKR Maddikunta, QV Pham, DC Nguyen… - Journal of Network and …, 2022 - Elsevier
Abstract The Internet of Things (IoT) has remarkably evolved over the last few years to
realize a wide range of newly emerging services and applications empowered by the …

An emerging threat Fileless malware: a survey and research challenges

Sudhakar, S Kumar - Cybersecurity, 2020 - Springer
With the evolution of cybersecurity countermeasures, the threat landscape has also evolved,
especially in malware from traditional file-based malware to sophisticated and multifarious …

CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques

M Shafiq, Z Tian, AK Bashir, X Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

IoT malicious traffic identification using wrapper-based feature selection mechanisms

M Shafiq, Z Tian, AK Bashir, X Du, M Guizani - Computers & Security, 2020 - Elsevier
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …

A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense

A Dahiya, BB Gupta - Future Generation Computer Systems, 2021 - Elsevier
DDoS attack is one of the most powerful cyber-weapons as it does not wait for a specific
server configuration or particular network state to attack or to disrupt any operation of the …

A survey of trust management in the Internet of Vehicles

A Hbaieb, S Ayed, L Chaari - Computer Networks, 2022 - Elsevier
In recent years, the emergence of the Internet of Vehicles (IoV) aims to enhance the users'
quality of experience through proposing more sophisticated services ranging from …

An edge computing based anomaly detection method in IoT industrial sustainability

X Yu, X Yang, Q Tan, C Shan, Z Lv - Applied Soft Computing, 2022 - Elsevier
In recent years, the evolving Internet of Things (IoT) technology has been widely used in
various industrial scenarios, whereby massive sensor data involving both normal data and …

Deep learning based emotion analysis of microblog texts

D Xu, Z Tian, R Lai, X Kong, Z Tan, W Shi - Information Fusion, 2020 - Elsevier
Traditional text emotion analysis methods are primarily devoted to studying extended texts,
such as news reports and full-length documents. Microblogs are considered short texts that …

A Productive Feature Selection Criterion for Bot-IoT Recognition based on Random Forest Algorithm

R Pavaiyarkarasi, T Manimegalai… - 2022 IEEE 11th …, 2022 - ieeexplore.ieee.org
For IoT security to function properly, it is necessary to identify anomalies and suspicious
activities in the Internet of things (IoT) network in order to keep an eye on things and stop …