The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks

M Shafiq, Z Gu, O Cheikhrouhou… - Wireless …, 2022 - Wiley Online Library
This paper provides an extensive and complete survey on the process of detecting and
preventing various types of IoT‐based security attacks. It is designed for software …

A review of machine learning-based human activity recognition for diverse applications

F Kulsoom, S Narejo, Z Mehmood… - Neural Computing and …, 2022 - Springer
Human activity recognition (HAR) is a very active yet challenging and demanding area of
computer science. Due to the articulated nature of human motion, it is not trivial to detect …

CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques

M Shafiq, Z Tian, AK Bashir, X Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city

M Shafiq, Z Tian, Y Sun, X Du, M Guizani - Future Generation Computer …, 2020 - Elsevier
Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in
smart city. Recently, the research community in the field of IoT Security endeavor hard to …

IoT malicious traffic identification using wrapper-based feature selection mechanisms

M Shafiq, Z Tian, AK Bashir, X Du, M Guizani - Computers & Security, 2020 - Elsevier
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …

A multidirectional LSTM model for predicting the stability of a smart grid

M Alazab, S Khan, SSR Krishnan, QV Pham… - Ieee …, 2020 - ieeexplore.ieee.org
The grid denotes the electric grid which consists of communication lines, control stations,
transformers, and distributors that aids in supplying power from the electrical plant to the …

Classification of arrhythmia by using deep learning with 2-D ECG spectral image representation

A Ullah, SM Anwar, M Bilal, RM Mehmood - Remote Sensing, 2020 - mdpi.com
The electrocardiogram (ECG) is one of the most extensively employed signals used in the
diagnosis and prediction of cardiovascular diseases (CVDs). The ECG signals can capture …

Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey

M Dibaei, X Zheng, Y Xia, X Xu, A Jolfaei… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
With recent developments in communication technologies, vehicular networks have become
a reality with various applications. However, the cybersecurity aspect of vehicular networks …

[HTML][HTML] Network traffic classification for data fusion: A survey

J Zhao, X Jing, Z Yan, W Pedrycz - Information Fusion, 2021 - Elsevier
Traffic classification groups similar or related traffic data, which is one main stream
technique of data fusion in the field of network management and security. With the rapid …

On the design and implementation of a blockchain enabled e-voting application within iot-oriented smart cities

G Rathee, R Iqbal, O Waqar, AK Bashir - IEEE Access, 2021 - ieeexplore.ieee.org
A smart city refers to an intelligent environment obtained by deploying all available
resources and recent technologies in a coordinated and smart manner. Intelligent sensors …