A systematic literature review of intrusion detection system for network security: Research trends, datasets and methods

R Ferdiana - … 4th International Conference on Informatics and …, 2020 - ieeexplore.ieee.org
Study on intrusion detection system (IDS) mostly allow network administrators to focus on
development activities in terms of network security and making better use of resource. Many …

[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review

JII Araya, H Rifà-Pous - Internet of Things, 2023 - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …

Industrial security solution for virtual reality

Z Lv, D Chen, R Lou, H Song - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
In order to protect industrial safety, improve the operation stability of the industrial control
system, conduct the response measures for network environment attacked by the external …

Ranking security of IoT-based smart home consumer devices

NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …

A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice

J Yang, L Sun - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid development and wide application of the Internet of Things (IoT) and sensor
technologies have produced good opportunities for the development of IoT-based smart …

TCN enhanced novel malicious traffic detection for IoT devices

L Xin, L Ziang, Z Yingli, Z Wenqiang, L Dong… - Connection …, 2022 - Taylor & Francis
With the development of IoT technology, more and more IoT devices are connected to the
network. Due to the hardware constraints of IoT devices themselves, it is difficult for …

Blockchain-based approach for e-health data access management with privacy protection

L Hirtan, P Krawiec, C Dobre… - 2019 IEEE 24th …, 2019 - ieeexplore.ieee.org
Blockchain is a technology that offers the ability to create new business models and solves
trust issues in a more efficient way. It can lead to many research opportunities and business …

A decentralized intrusion detection system for security of generation control

SD Roy, S Debbarma, A Iqbal - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Recently, several incidents have been reported relating to security breaches in the power
system network. As the operation of the automatic generation control (AGC) system fully …

[HTML][HTML] IoT traffic: Modeling and measurement experiments

H Nguyen-An, T Silverston, T Yamazaki, T Miyoshi - IoT, 2021 - mdpi.com
We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect
cyber–physical data and provide information on the environment. Hence, IoT traffic will count …

Operational data based intrusion detection system for smart grid

G Efstathopoulos, PR Grammatikis… - 2019 IEEE 24th …, 2019 - ieeexplore.ieee.org
With the rapid progression of Information and Communication Technology (ICT) and
especially of Internet of Things (IoT), the conventional electrical grid is transformed into a …