A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …

[HTML][HTML] Unleashing the power of IoT: A comprehensive review of IoT applications and future prospects in healthcare, agriculture, smart homes, smart cities, and …

R Chataut, A Phoummalayvane, R Akl - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) technology and devices represent an exciting field in computer
science that is rapidly emerging worldwide. The demand for automation and efficiency has …

A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system

A Gaurav, BB Gupta, PK Panigrahi - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued
academics' and business information systems' attention in recent years. The Internet of …

Complementing IoT services through software defined networking and edge computing: A comprehensive survey

W Rafique, L Qi, I Yaqoob, M Imran… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Millions of sensors continuously produce and transmit data to control real-world
infrastructures using complex networks in the Internet of Things (IoT). However, IoT devices …

A survey of DDoS attacking techniques and defence mechanisms in the IoT network

R Vishwakarma, AK Jain - Telecommunication systems, 2020 - Springer
Internet-of-things has emerged out as an important invention towards employing the
tremendous power of wireless media in the real world. We can control our surroundings by …

Detecting Internet of Things attacks using distributed deep learning

GDLT Parra, P Rad, KKR Choo, N Beebe - Journal of Network and …, 2020 - Elsevier
The reliability of Internet of Things (IoT) connected devices is heavily dependent on the
security model employed to protect user data and prevent devices from engaging in …

Toward a lightweight intrusion detection system for the internet of things

SU Jan, S Ahmed, V Shakhov, I Koo - IEEE access, 2019 - ieeexplore.ieee.org
Integration of the Internet into the entities of the different domains of human society (such as
smart homes, health care, smart grids, manufacturing processes, product supply chains, and …

[HTML][HTML] A survey of IoT malware and detection methods based on static features

QD Ngo, HT Nguyen, VH Le, DH Nguyen - ICT express, 2020 - Elsevier
Due to a lack of security design as well as the specific characteristics of IoT devices such as
the heterogeneity of processor architecture, IoT malware detection has to deal with very …

Distributed denial of service attacks and its defenses in IoT: a survey

MM Salim, S Rathore, JH Park - The Journal of Supercomputing, 2020 - Springer
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …

A two-fold machine learning approach to prevent and detect IoT botnet attacks

F Hussain, SG Abbas, IM Pires, S Tanveer… - Ieee …, 2021 - ieeexplore.ieee.org
The botnet attack is a multi-stage and the most prevalent cyber-attack in the Internet of
Things (IoT) environment that initiates with scanning activity and ends at the distributed …