[HTML][HTML] A review of security concerns in Internet of Things

E Leloglu - Journal of Computer and Communications, 2017 - scirp.org
The Internet of Things (IoT) represents a technologically optimistic future where objects will
be connected to the internet and make intelligent collaborations with other objects …

REATO: REActing TO Denial of Service attacks in the Internet of Things

S Sicari, A Rizzardi, D Miorandi, A Coen-Porisini - Computer Networks, 2018 - Elsevier
Abstract Denial of Service (DoS) attack represents until now a relevant problem in Internet-
based contexts. In fact, it is both difficult to recognize and to counteract. Along with the …

Intrusion Detection Techniques in Social Media Cloud: Review and Future Directions

KM Abuali, L Nissirat… - … and Mobile Computing, 2023 - Wiley Online Library
As social media use increases, the number of users has risen also. This has increased the
volume of data carried over the network, making it more important to secure users' data and …

TRUST‐based features for detecting the intruders in the Internet of Things network using deep learning

HN Bhor, M Kalla - Computational Intelligence, 2022 - Wiley Online Library
Abstract Internet of Things (IoT) is a trending domain and has acquired much interest for
various kinds of civilian applications. The purpose of IoT is to make objects accessible and …

A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing

J Chase, D Niyato, P Wang, S Chaisiri… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
As computing services are increasingly cloud-based, corporations are investing in cloud-
based security measures. The Security-as-a-Service (SECaaS) paradigm allows customers …

Comparative analysis of CN2 rule induction with other classification algorithms for network security

N Kumar, U Kumar - Multimedia Tools and Applications, 2022 - Springer
Abstract Network Intrusion Detection (NID) is an important domain of research and as the
network traffic is growing enormously, new challenges are emerging forth in terms of quality …

[PDF][PDF] Signature based network intrusion detection system using feature selection on android

OB Onyebuchi - Signature, 2020 - academia.edu
This paper Smart Intrusion Detection System (IDS), is a contribution to efforts towards
detecting intrusion and malicious activities on Android phone. The goal of this paper is to …

An Overview of the Evolutionary and Revolutionary Trends of Computer Network Intrusion and Detection

OS POPOỌLA - Available at SSRN 4532805, 2023 - papers.ssrn.com
The metrics for the costs of managing data and information are fundamentally a function of
the breadth and depth of the use of data and information, and invariably the degree of the …

Channel-Centric Spatio-Temporal Graph Networks for Network-based Intrusion Detection

ES Escriche, J Nyberg, Y Kim… - 2024 IEEE Conference on …, 2024 - ieeexplore.ieee.org
The increasing frequency and complexity of cyberattacks against critical digital
infrastructures require novel methods that can detect intrusions in a timely manner. Recent …

A performance study of anomaly detection using entropy method

AA Waskita, H Suhartanto… - … Conference on Computer …, 2016 - ieeexplore.ieee.org
An experiment to study the entropy method for an anomaly detection system has been
performed. The study has been conducted using real data generated from the distributed …