Machine learning and deep learning methods for intrusion detection systems in iomt: A survey

Y Rbah, M Mahfoudi, Y Balboul… - … Research in Applied …, 2022 - ieeexplore.ieee.org
The integration of healthcare-related sensors and devices into IoT has resulted in the
evolution of the IoMT (Internet of Medical Things). IoMT that can be viewed as an …

A framework for anomaly detection in IoT networks using conditional generative adversarial networks

I Ullah, QH Mahmoud - IEEE Access, 2021 - ieeexplore.ieee.org
While anomaly detection and the related concept of intrusion detection are widely studied,
detecting anomalies in new operating behavior in environments such as the Internet of …

An efficient blockchain‐based approach to improve the accuracy of intrusion detection systems

AA Abubakar, J Liu, E Gilliard - Electronics Letters, 2023 - Wiley Online Library
Abstract Intrusion Detection System (IDS) is a critical cybersecurity task that involves
monitoring network traffic for malicious activity and taking appropriate action to stop it …

An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks

S Kranthi, M Kanchana, M Suneetha - Peer-to-Peer Networking and …, 2023 - Springer
Securing digital data transmission or communication is essential for the growing smart cities.
At the same, malicious vulnerabilities are also enhanced to break the security. Hence …

[HTML][HTML] Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City

NS Alotaibi, HI Ahmed, SOM Kamel - Sensors, 2023 - mdpi.com
The internet of things (IoT) technology presents an intelligent way to improve our lives and
contributes to many fields such as industry, communications, agriculture, etc. Unfortunately …

An analysis of Intrusion detection systems in IIoT

R Latha, RM Bommi - 2023 Eighth International Conference on …, 2023 - ieeexplore.ieee.org
Enhancing manufacturing and industrial processes are achieved using smart sensors and
actuators known as the industrial internet or things or IIoT. By implementing IIoT, machines …

Evaluating intrusion detection points in an end-to-end solution

L Pankaczi - 2023 - diva-portal.org
Evaluating all intrusion detection points in an end-to-end cyberphysical system can be
challenging. This master thesis focuses on evaluating the security of the most exposed part …

Simulating the Effectiveness of an IoT Parcel Alert System for Enhancing Delivery Efficiency and Safety During Covid-19

AA Zainuddin, H Mansor, NI Badrulhisham… - Malaysian Journal of …, 2023 - mjsat.com.my
Abstract The Internet of Things (IoT) has revolutionized the way devices communicate and
interact with one another. Malaysia has witnessed a substantial increase in online …

[PDF][PDF] A CRITICAL REVIEW OF IDS IN IOT

A Vinitha, V Jaiganesh - avpcas.org
The secured communication network is the biggest challenge for all human life. The digital
communication has increased a lot and the loss of confidentiality and security is more for …

A Novel Multilayer IDS Architecture for Learning Undefined Attacks

MAS Al-Zewairi - 2021 - search.proquest.com
The tremendous advancement in information technology had substantial effects on the
current and future of cybersecurity. The immense number of Internet-connected devices with …