A big data analytics for DDOS attack detection using optimized ensemble framework in Internet of Things

I Ahmad, Z Wan, A Ahmad - Internet of Things, 2023 - Elsevier
Abstract Internet of Things (IoT) devices significantly threaten tech-dependant businesses
and communities. With the rapid integration of IoT devices into local networks, a system to …

Strategies for leveraging big data and analytics for business development: a comprehensive review across sectors

NA Ochuba, OO Amoo, ES Okafor, O Akinrinola… - Computer Science & IT …, 2024 - fepbl.com
In today's data-driven world, the ability to effectively leverage big data and analytics has
become a key driver of business development across sectors. This comprehensive review …

Smart and future applications of internet of multimedia things (IoMT) using big data analytics

R Sharma, D Gavalas, SL Peng - Sensors, 2022 - mdpi.com
This Special Issue is focused on breakthrough developments in the field of Internet of
Multimedia Things (IoMT), particularly on smart and future applications of IoMT using big …

IoT technology enabled stochastic computing paradigm for numerical simulation of heterogeneous mosquito model

S Latif, Z Sabir, MAZ Raja, GC Altamirano… - Multimedia Tools and …, 2023 - Springer
In this communication, a fractional order design and numerical form of the solutions are
presented for numerical simulations of heterogeneous mosquito model. The use of the …

Key requirements for the detection and sharing of behavioral indicators of compromise

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …

[PDF][PDF] Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset

J Jose, DV Jose - International Journal of Electrical and Computer …, 2023 - academia.edu
Due to technological advancements in recent years, the availability and usage of smart
electronic gadgets have drastically increased. Adoption of these smart devices for a variety …

Design of metaheuristic optimization algorithms for deep learning model for secure IoT environment

A Sagu, NS Gill, P Gulia, PK Singh, WC Hong - Sustainability, 2023 - mdpi.com
Because of the rise in the number of cyberattacks, the devices that make up the Internet of
Things (IoT) environment are experiencing increased levels of security risks. In recent years …

Technologies used to facilitate remote rehabilitation of adults with deconditioning, musculoskeletal conditions, stroke, or traumatic brain injury: an umbrella review

D Edwards, J Williams, J Carrier… - JBI evidence synthesis, 2022 - journals.lww.com
Objective: The objective of this review was to provide an overview of technologies (devices,
tools, or software applications) used to facilitate remote rehabilitation of adults with …

A universal testbed for IOT wireless technologies: Abstracting latency, error rate and stability from the IOT protocol and hardware platform

E Saavedra, L Mascaraque, G Calderon, G Del Campo… - Sensors, 2022 - mdpi.com
IoT applications rely strongly on the performance of wireless communication networks.
There is a wide variety of wireless IoT technologies and choosing one over another depends …

SOAR4IoT: securing IoT assets with digital twins

P Empl, D Schlette, D Zupfer, G Pernul - Proceedings of the 17th …, 2022 - dl.acm.org
As more and more security tools provide organizations with cybersecurity capabilities,
security analysts are overwhelmed by security events. Resolving these events is challenging …