[HTML][HTML] Engineering the application of machine learning in an IDS based on IoT traffic flow

N Prazeres, RLC Costa, L Santos… - Intelligent Systems with …, 2023 - Elsevier
Abstract Internet of Things (IoT) devices are now widely used, enabling intelligent services
that, in association with new communication technologies like the 5G and broadband …

IoMT-TrafficData: Dataset and Tools for Benchmarking Intrusion Detection in Internet of Medical Things

J Areia, I Bispo, L Santos, RLC Costa - IEEE Access, 2024 - ieeexplore.ieee.org
The healthcare industry relies heavily on a robust medical infrastructure but generates
sensitive data about patients whose confidentiality and integrity protection must be …

Risk and threat mitigation techniques in internet of things (IoT) environments: a survey

M Salayma - Frontiers in The Internet of Things, 2024 - frontiersin.org
Security in the Internet of Things (IoT) remains a predominant area of concern. Although
several other surveys have been published on this topic in recent years, the broad spectrum …

[HTML][HTML] An innovative honeypot architecture for detecting and mitigating hardware trojans in IoT devices

AHE Omar, H Soubra, DK Moulla, A Abran - IoT, 2024 - mdpi.com
The exponential growth and widespread adoption of Internet of Things (IoT) devices have
introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating …

Security Principles in Smart and Agile Cybersecurity for IoT and IIoT Environments

AS Alshraa, L Al Sardy, M Dibaei… - Smart and Agile …, 2024 - igi-global.com
As the integration of the internet of things (IoT) and industrial internet of things (IIoT)
technologies continues to increase across various industries, ensuring strong cybersecurity …

[PDF][PDF] An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices

A Houssam, H Soubra, DK Moulla, A Abran - 2024 - preprints.org
The exponential growth and widespread adoption of Internet of Things (IoT) devices have
introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating …