Related references
Note: Only part of the references are listed.Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
Jun Zhang et al.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2022)
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
Abdullah Al-Noman Patwary et al.
ELECTRONICS (2021)
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey
Yuantian Miao et al.
ACM COMPUTING SURVEYS (2021)
Cyber Vulnerability Intelligence for Internet of Things Binary
Shigang Liu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
A Two-Level Flow-Based Anomalous Activity Detection System for IoT Networks
Imtiaz Ullah et al.
ELECTRONICS (2020)
A Hybrid Intrusion Detection Model Combining SAE with Kernel Approximation in Internet of Things
Yukun Wu et al.
SENSORS (2020)
Scalable Data Storage Design for Nonstationary IoT Environment With Adaptive Security and Reliability
Andrei Tchernykh et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Security Analysis of Network Anomalies Mitigation Schemes in IoT Networks
Muhammad Aminu Lawal et al.
IEEE ACCESS (2020)
HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices
T. J. OConnor et al.
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19) (2019)
Cracking IoT Device User Account via Brute-force Attack to SMS Authentication Code
Dong Wang et al.
PROCEEDINGS OF THE FIRST WORKSHOP ON RADICAL AND EXPERIENTIAL SECURITY (RESEC'18) (2018)
Botnets and Internet of Things Security
Elisa Bertino et al.
COMPUTER (2017)
Technical Aspects of Cyber Kill Chain
Tarun Yadav et al.
SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015) (2015)
An Overview of IP Flow-Based Intrusion Detection
Anna Sperotto et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)
Anomaly detection
Varun Chandola et al.
ACM COMPUTING SURVEYS (2009)
Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection
Gang Kou et al.
INFORMATION SCIENCES (2009)