Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions
出版年份 2022 全文链接
标题
Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions
作者
关键词
-
出版物
MOBILE NETWORKS & APPLICATIONS
Volume -, Issue -, Pages -
出版商
Springer Science and Business Media LLC
发表日期
2022-03-14
DOI
10.1007/s11036-022-01937-3
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- System log clustering approaches for cyber security applications: A survey
- (2020) Max Landauer et al. COMPUTERS & SECURITY
- IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model
- (2020) Iqbal H. Sarker et al. Symmetry-Basel
- Detecting Internet of Things attacks using distributed deep learning
- (2020) Gonzalo De La Torre Parra et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Machine learning based solutions for security of Internet of Things (IoT): A survey
- (2020) Syeda Manjia Tahsien et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services
- (2020) Iqbal H. Sarker et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions
- (2020) Iqbal H. Sarker et al. MOBILE NETWORKS & APPLICATIONS
- Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns
- (2019) Morteza Safaei Pour et al. Digital Investigation
- Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset
- (2019) Nickolaos Koroniotis et al. Future Generation Computer Systems-The International Journal of eScience
- A study of IoT malware activities using association rule learning for darknet sensor data
- (2019) Seiichi Ozawa et al. International Journal of Information Security
- BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model
- (2019) Iqbal H. Sarker et al. MOBILE NETWORKS & APPLICATIONS
- High-Reliability and Low-Latency Wireless Communication for Internet of Things: Challenges, Fundamentals, and Enabling Technologies
- (2019) Zheng Ma et al. IEEE Internet of Things Journal
- Robust detection for network intrusion of industrial IoT based on multi-CNN fusion
- (2019) Yanmiao Li et al. MEASUREMENT
- A Survey of Random Forest Based Methods for Intrusion Detection Systems
- (2018) Paulo Angelo Alves Resende et al. ACM COMPUTING SURVEYS
- Correlating human traits and cyber security behavior intentions
- (2018) Margaret Gratian et al. COMPUTERS & SECURITY
- MalDozer: Automatic framework for android malware detection using deep learning
- (2018) ElMouatez Billah Karbab et al. Digital Investigation
- An intrusion detection method for internet of things based on suppressed fuzzy clustering
- (2018) Liqun Liu et al. EURASIP Journal on Wireless Communications and Networking
- Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
- (2018) Aakanksha Tewari et al. Future Generation Computer Systems-The International Journal of eScience
- IoT security: Review, blockchain solutions, and open challenges
- (2018) Minhaj Ahmad Khan et al. Future Generation Computer Systems-The International Journal of eScience
- Detecting Malware with an Ensemble Method Based on Deep Neural Network
- (2018) Jinpei Yan et al. Security and Communication Networks
- Machine Learning and Deep Learning Methods for Cybersecurity
- (2018) Yang Xin et al. IEEE Access
- The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved
- (2018) Wei Zhou et al. IEEE Internet of Things Journal
- IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?
- (2018) Liang Xiao et al. IEEE SIGNAL PROCESSING MAGAZINE
- Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
- (2018) Yang Lu et al. IEEE Internet of Things Journal
- Current research on Internet of Things (IoT) security: A survey
- (2018) Mardiana binti Mohamad Noor et al. Computer Networks
- Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch
- (2018) Xuyang Jing et al. Information Fusion
- Internet of Things security: A survey
- (2017) Fadele Ayotunde Alaba et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT
- (2017) Vishal Sharma et al. Security and Communication Networks
- Intelligent Intrusion Detection in Low-Power IoTs
- (2016) Ahmed Saeed et al. ACM Transactions on Internet Technology
- OCPAD: One class Naive Bayes classifier for payload based anomaly detection
- (2016) Mayank Swarnkar et al. EXPERT SYSTEMS WITH APPLICATIONS
- Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges
- (2016) Ejaz Ahmed et al. IEEE WIRELESS COMMUNICATIONS
- Fighting against phishing attacks: state of the art and future challenges
- (2016) B. B. Gupta et al. NEURAL COMPUTING & APPLICATIONS
- Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations
- (2016) Qian Xu et al. IEEE Access
- Security, privacy and trust in Internet of Things: The road ahead
- (2015) S. Sicari et al. Computer Networks
- Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
- (2015) Ala Al-Fuqaha et al. IEEE Communications Surveys and Tutorials
- Proximity Detection with RFID: A Step Toward the Internet of Things
- (2015) Miodrag Bolic et al. IEEE PERVASIVE COMPUTING
- Using a Prediction Model to Manage Cyber Security Threats
- (2015) Venkatesh Jaganathan et al. TheScientificWorldJOURNAL
- Using a Prediction Model to Manage Cyber Security Threats
- (2015) Venkatesh Jaganathan et al. Scientific World Journal
- The internet of things: a survey
- (2014) Shancang Li et al. INFORMATION SYSTEMS FRONTIERS
- Linear SVM-Based Android Malware Detection for Reliable IoT Services
- (2014) Hyo-Sik Ham et al. Journal of Applied Mathematics
- Internet of Things (IoT): A vision, architectural elements, and future directions
- (2013) Jayavardhana Gubbi et al. Future Generation Computer Systems-The International Journal of eScience
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
- The Internet of Things: A survey
- (2010) Luigi Atzori et al. Computer Networks
- Building the Internet of Things Using RFID: The RFID Ecosystem Experience
- (2009) Evan Welbourne et al. IEEE INTERNET COMPUTING
- Intrusion detection using fuzzy association rules
- (2008) Arman Tajbakhsh et al. APPLIED SOFT COMPUTING
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started