[HTML][HTML] Deep learning for cyber threat detection in IoT networks: A review

A Aldhaheri, F Alwahedi, MA Ferrag, A Battah - Internet of Things and Cyber …, 2023 - Elsevier
Abstract The Internet of Things (IoT) has revolutionized modern tech with interconnected
smart devices. While these innovations offer unprecedented opportunities, they also …

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

S Cherbal, A Zier, S Hebal, L Louail… - The Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …

[HTML][HTML] Ensuring network security with a robust intrusion detection system using ensemble-based machine learning

MA Hossain, MS Islam - Array, 2023 - Elsevier
Intrusion detection is a critical aspect of network security to protect computer systems from
unauthorized access and attacks. The capacity of traditional intrusion detection systems …

Optimal Integration of Machine Learning for Distinct Classification and Activity State Determination in Multiple Sclerosis and Neuromyelitis Optica

M Gharaibeh, W Abedalaziz, NA Alawad, H Gharaibeh… - Technologies, 2023 - mdpi.com
The intricate neuroinflammatory diseases multiple sclerosis (MS) and neuromyelitis optica
(NMO) often present similar clinical symptoms, creating challenges in their precise detection …

Securing smart healthcare cyber-physical systems against blackhole and greyhole attacks using a blockchain-enabled gini index framework

M Javed, N Tariq, M Ashraf, FA Khan, M Asim, M Imran - Sensors, 2023 - mdpi.com
The increasing reliance on cyber-physical systems (CPSs) in critical domains such as
healthcare, smart grids, and intelligent transportation systems necessitates robust security …

AI in IIoT management of cybersecurity for industry 4.0 and industry 5.0 purposes

G Czeczot, I Rojek, D Mikołajewski, B Sangho - Electronics, 2023 - mdpi.com
If we look at the chronology of transitions between successive stages of industrialization, it is
impossible not to notice a significant acceleration. There were 100 years between the …

Robust genetic machine learning ensemble model for intrusion detection in network traffic

MA Akhtar, SMO Qadri, MA Siddiqui, SMN Mustafa… - Scientific Reports, 2023 - nature.com
Network security has developed as a critical research subject as a result of the Rapid
advancements in the development of Internet and communication technologies over the …

Assessing acetabular index angle in infants: a deep learning-based novel approach

F Jan, A Rahman, R Busaleh, H Alwarthan, S Aljaser… - Journal of …, 2023 - mdpi.com
Developmental dysplasia of the hip (DDH) is a disorder characterized by abnormal hip
development that frequently manifests in infancy and early childhood. Preventing DDH from …

VBQ-Net: a novel vectorization-based boost quantized network model for maximizing the security level of IoT system to prevent intrusions

G Perumal, G Subburayalu, Q Abbas, SM Naqi… - Systems, 2023 - mdpi.com
Data sharing with additional devices across wireless networks is made simple and
advantageous by the Internet of Things (IoT), an emerging technology. However, IoT …

Blockchain and artificial intelligence as enablers of cyber security in the era of IoT and IIoT applications

MA Ferrag, L Maglaras, M Benbouzid - Journal of Sensor and Actuator …, 2023 - mdpi.com
The fifth revolution of the industrial era—or Industry 5.0—is the new industry trend that
defines the smart factory concept. This concept is based on emerging technologies, such as …