Related references
Note: Only part of the references are listed.Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM
Xiaoyao Liao et al.
SECURITY AND COMMUNICATION NETWORKS (2022)
Landscape of IoT security
Andy Aidoo et al.
COMPUTER SCIENCE REVIEW (2022)
Fast, Lightweight IoT Anomaly Detection Using Feature Pruning and PCA
John Carter et al.
37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (2022)
Intelligent authentication of 5G healthcare devices: A survey
Ali Hassan Sodhro et al.
INTERNET OF THINGS (2022)
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions
Moustafa Mamdouh et al.
COMPUTERS & SECURITY (2021)
Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection
Yifei Zhang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)
A Novel Image Steganography Method for Industrial Internet of Things Security
M. Hassaballah et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
IoT-Praetor: Undesired Behaviors Detection for IoT Devices
Juan Wang et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Intelligence in the Internet of Medical Things era: A systematic review of current and future trends
Fadi Al-Turjman et al.
COMPUTER COMMUNICATIONS (2020)
A statistical pattern based feature extraction method on system call traces for anomaly detection
Zhen Liu et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2020)
Industry 4.0, digitization, and opportunities for sustainability
Morteza Ghobakhloo
JOURNAL OF CLEANER PRODUCTION (2020)
Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices
Mojtaba Eskandari et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Detecting Behavioral Change of IoT Devices Using Clustering-Based Network Traffic Modeling
Arunan Sivanathan et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Anomaly Detection for IoT Time-Series Data: A Survey
Andrew A. Cook et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
IoT Malware Classification Based on System Calls
Dang Kien Hoang et al.
2020 RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (RIVF 2020) (2020)
Lightweight collaborative anomaly detection for the IoT using blockchain
Yisroel Mirsky et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)
DIoT: A Federated Self-learning Anomaly Detection System for IoT
Thien Duc Nguyen et al.
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019) (2019)
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices
Dominik Breitenbacher et al.
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)
BRIoT: Behavior Rune Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems
Vishal Sharma et al.
IEEE ACCESS (2019)
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
Bako Ali et al.
SENSORS (2018)
DDoS in the IoT: Mirai and Other Botnets
Constantinos Kolias et al.
COMPUTER (2017)
Botnets and Internet of Things Security
Elisa Bertino et al.
COMPUTER (2017)
What Is a Savitzky-Golay Filter?
Ronald W. Schafer
IEEE SIGNAL PROCESSING MAGAZINE (2011)
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Animesh Patcha et al.
COMPUTER NETWORKS (2007)
Robustness of the Markov-chain model for cyber-attack detection
N Ye et al.
IEEE TRANSACTIONS ON RELIABILITY (2004)