Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions
Authors
Keywords
-
Journal
MOBILE NETWORKS & APPLICATIONS
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2022-03-14
DOI
10.1007/s11036-022-01937-3
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- System log clustering approaches for cyber security applications: A survey
- (2020) Max Landauer et al. COMPUTERS & SECURITY
- IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model
- (2020) Iqbal H. Sarker et al. Symmetry-Basel
- Detecting Internet of Things attacks using distributed deep learning
- (2020) Gonzalo De La Torre Parra et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Machine learning based solutions for security of Internet of Things (IoT): A survey
- (2020) Syeda Manjia Tahsien et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services
- (2020) Iqbal H. Sarker et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions
- (2020) Iqbal H. Sarker et al. MOBILE NETWORKS & APPLICATIONS
- Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns
- (2019) Morteza Safaei Pour et al. Digital Investigation
- Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset
- (2019) Nickolaos Koroniotis et al. Future Generation Computer Systems-The International Journal of eScience
- A study of IoT malware activities using association rule learning for darknet sensor data
- (2019) Seiichi Ozawa et al. International Journal of Information Security
- BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model
- (2019) Iqbal H. Sarker et al. MOBILE NETWORKS & APPLICATIONS
- High-Reliability and Low-Latency Wireless Communication for Internet of Things: Challenges, Fundamentals, and Enabling Technologies
- (2019) Zheng Ma et al. IEEE Internet of Things Journal
- Robust detection for network intrusion of industrial IoT based on multi-CNN fusion
- (2019) Yanmiao Li et al. MEASUREMENT
- A Survey of Random Forest Based Methods for Intrusion Detection Systems
- (2018) Paulo Angelo Alves Resende et al. ACM COMPUTING SURVEYS
- Correlating human traits and cyber security behavior intentions
- (2018) Margaret Gratian et al. COMPUTERS & SECURITY
- MalDozer: Automatic framework for android malware detection using deep learning
- (2018) ElMouatez Billah Karbab et al. Digital Investigation
- An intrusion detection method for internet of things based on suppressed fuzzy clustering
- (2018) Liqun Liu et al. EURASIP Journal on Wireless Communications and Networking
- Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
- (2018) Aakanksha Tewari et al. Future Generation Computer Systems-The International Journal of eScience
- IoT security: Review, blockchain solutions, and open challenges
- (2018) Minhaj Ahmad Khan et al. Future Generation Computer Systems-The International Journal of eScience
- Detecting Malware with an Ensemble Method Based on Deep Neural Network
- (2018) Jinpei Yan et al. Security and Communication Networks
- Machine Learning and Deep Learning Methods for Cybersecurity
- (2018) Yang Xin et al. IEEE Access
- The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved
- (2018) Wei Zhou et al. IEEE Internet of Things Journal
- IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?
- (2018) Liang Xiao et al. IEEE SIGNAL PROCESSING MAGAZINE
- Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
- (2018) Yang Lu et al. IEEE Internet of Things Journal
- Current research on Internet of Things (IoT) security: A survey
- (2018) Mardiana binti Mohamad Noor et al. Computer Networks
- Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch
- (2018) Xuyang Jing et al. Information Fusion
- Internet of Things security: A survey
- (2017) Fadele Ayotunde Alaba et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT
- (2017) Vishal Sharma et al. Security and Communication Networks
- Intelligent Intrusion Detection in Low-Power IoTs
- (2016) Ahmed Saeed et al. ACM Transactions on Internet Technology
- OCPAD: One class Naive Bayes classifier for payload based anomaly detection
- (2016) Mayank Swarnkar et al. EXPERT SYSTEMS WITH APPLICATIONS
- Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges
- (2016) Ejaz Ahmed et al. IEEE WIRELESS COMMUNICATIONS
- Fighting against phishing attacks: state of the art and future challenges
- (2016) B. B. Gupta et al. NEURAL COMPUTING & APPLICATIONS
- Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations
- (2016) Qian Xu et al. IEEE Access
- Security, privacy and trust in Internet of Things: The road ahead
- (2015) S. Sicari et al. Computer Networks
- Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
- (2015) Ala Al-Fuqaha et al. IEEE Communications Surveys and Tutorials
- Proximity Detection with RFID: A Step Toward the Internet of Things
- (2015) Miodrag Bolic et al. IEEE PERVASIVE COMPUTING
- Using a Prediction Model to Manage Cyber Security Threats
- (2015) Venkatesh Jaganathan et al. TheScientificWorldJOURNAL
- Using a Prediction Model to Manage Cyber Security Threats
- (2015) Venkatesh Jaganathan et al. Scientific World Journal
- The internet of things: a survey
- (2014) Shancang Li et al. INFORMATION SYSTEMS FRONTIERS
- Linear SVM-Based Android Malware Detection for Reliable IoT Services
- (2014) Hyo-Sik Ham et al. Journal of Applied Mathematics
- Internet of Things (IoT): A vision, architectural elements, and future directions
- (2013) Jayavardhana Gubbi et al. Future Generation Computer Systems-The International Journal of eScience
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
- The Internet of Things: A survey
- (2010) Luigi Atzori et al. Computer Networks
- Building the Internet of Things Using RFID: The RFID Ecosystem Experience
- (2009) Evan Welbourne et al. IEEE INTERNET COMPUTING
- Intrusion detection using fuzzy association rules
- (2008) Arman Tajbakhsh et al. APPLIED SOFT COMPUTING
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationPublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More