[HTML][HTML] Survey on recent advances in IoT application layer protocols and machine learning scope for research directions

PK Donta, SN Srirama, T Amgoth… - Digital Communications …, 2022 - Elsevier
Abstract The Internet of Things (IoT) has been growing over the past few years due to its
flexibility and ease of use in real-time applications. The IoT's foremost task is ensuring that …

Data management in industry 4.0: State of the art and open challenges

TP Raptis, A Passarella, M Conti - IEEE Access, 2019 - ieeexplore.ieee.org
Information and communication technologies are permeating all aspects of industrial and
manufacturing systems, expediting the generation of large volumes of industrial data. This …

CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques

M Shafiq, Z Tian, AK Bashir, X Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …

MTH-IDS: A multitiered hybrid intrusion detection system for internet of vehicles

L Yang, A Moubayed, A Shami - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Modern vehicles, including connected vehicles and autonomous vehicles, nowadays
involve many electronic control units connected through intravehicle networks (IVNs) to …

[HTML][HTML] Ensemble machine learning approach for classification of IoT devices in smart home

I Cvitić, D Peraković, M Periša, B Gupta - International Journal of Machine …, 2021 - Springer
The emergence of the Internet of Things (IoT) concept as a new direction of technological
development raises new problems such as valid and timely identification of such devices …

IoT malicious traffic identification using wrapper-based feature selection mechanisms

M Shafiq, Z Tian, AK Bashir, X Du, M Guizani - Computers & Security, 2020 - Elsevier
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …

Toward effective intrusion detection using log-cosh conditional variational autoencoder

X Xu, J Li, Y Yang, F Shen - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Intrusion detection is an important technique that can provide solid protection for the network
equipment against the security attacks. However, the attacks are usually unbalanced in …

A Productive Feature Selection Criterion for Bot-IoT Recognition based on Random Forest Algorithm

R Pavaiyarkarasi, T Manimegalai… - 2022 IEEE 11th …, 2022 - ieeexplore.ieee.org
For IoT security to function properly, it is necessary to identify anomalies and suspicious
activities in the Internet of things (IoT) network in order to keep an eye on things and stop …

Federated feature selection for horizontal federated learning in iot networks

X Zhang, A Mavromatis, A Vafeas… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Under horizontal federated learning (HFL) in the Internet of Things (IoT) scenarios, different
user data sets have significant similarities on the feature spaces, the final goal is to build a …

Two-stage improved Grey Wolf optimization algorithm for feature selection on high-dimensional classification

C Shen, K Zhang - Complex & Intelligent Systems, 2022 - Springer
In recent years, evolutionary algorithms have shown great advantages in the field of feature
selection because of their simplicity and potential global search capability. However, most of …