The Internet of Things (IoT) is transforming how we live and work, and its applications are widespread, spanning smart homes, industrial monitoring, smart cities, healthcare …
Companies seek to promote a swift digitalization of their business processes and new disruptive features to gain an advantage over their competitors. This often results in a wider …
R Kimanzi, P Kimanga, D Cherori… - arXiv preprint arXiv …, 2024 - arxiv.org
The increase in network attacks has necessitated the development of robust and efficient intrusion detection systems (IDS) capable of identifying malicious activities in real-time. In …
S Zhu, X Xu, J Zhao, F Xiao - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The purpose of malicious traffic detection and identification in the Internet of Things (IoT) is to detect the intrusion of malicious traffic within the IoT network into IoT devices. Detection …
Z Ul Abideen, X Sun, C Sun - Journal of Forecasting, 2024 - Wiley Online Library
The challenges in citywide traffic flow are intricate, encompassing various factors like temporal and spatial dependencies, holidays, and weather. Despite the complexity, there …
Y Wang, W Zheng, Z Liu, J Wang, H Shi, M Gu, Y Di - Electronics, 2023 - mdpi.com
The rapid development of cloud–fog–edge computing and mobile devices has led to massive amounts of data being generated. Also, artificial intelligence technology, like …
Y Zhang, G Li, Q Duan, J Wu - Physical Communication, 2022 - Elsevier
An enterprise's private cloud may be attacked by attackers when communicating with the public cloud. Although traffic detection methods based on deep learning have been widely …
Deep learning solutions are instrumental in cybersecurity, harnessing their ability to analyze vast datasets, identify complex patterns, and detect anomalies. However, malevolent actors …
S Tossou, M Qorib, T Kacem - 2023 International Symposium …, 2023 - ieeexplore.ieee.org
In recent years, computer networks have seen a considerable proliferation in terms of performance and total traffic volume. At the same time, cyber attacks have been on the rise …