Related references
Note: Only part of the references are listed.An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud
Rishabh Gupta et al.
IEEE SYSTEMS JOURNAL (2023)
Boost-Defence for resilient IoT networks: A head-to-toe approach
Qasem Abu Al-Haija et al.
EXPERT SYSTEMS (2022)
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
Muhammad Husnain et al.
SENSORS (2022)
Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning
Qasem Abu Al-Haija et al.
SENSORS (2022)
Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection
Janmenjoy Nayak et al.
JOURNAL OF SUPERCOMPUTING (2022)
IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method
Khalid Albulayhi et al.
APPLIED SCIENCES-BASEL (2022)
ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks
Qasem Abu Al-Haija et al.
JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2022)
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Andrew Churcher et al.
SENSORS (2021)
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT
Muhammad Almas Khan et al.
SENSORS (2021)
A Survey on Architecture, Protocols and Challenges in IoT
C. C. Sobin
WIRELESS PERSONAL COMMUNICATIONS (2020)
Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model
Mohammad Mehedi Hassan et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic
Mahdis Saharkhizan et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks
Qasem Abu Al-Haija et al.
ELECTRONICS (2020)
An Evaluation of Machine Learning-based Anomaly Detection in a SCADA System Using the Modbus Protocol
Brandon Phillips et al.
ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE (2020)
TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems
Abdullah Alsaedi et al.
IEEE ACCESS (2020)
A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems
Hanan Hindy et al.
IEEE ACCESS (2020)
A holistic review of Network Anomaly Detection Systems: A comprehensive survey
Nour Moustafa et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach
Xiang Li et al.
IEEE ACCESS (2019)
A Configurable Distributed Data Analytics Infrastructure for the Industrial Internet of Things
Nikos Kefalakis et al.
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS) (2019)
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set
Simon Duque Anton et al.
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) (2019)
Internet of Things is a revolutionary approach for future technology enhancement: a review
Sachin Kumar et al.
JOURNAL OF BIG DATA (2019)
Performance evaluation of full-cloud and edge-cloud architectures for Industrial IoT anomaly detection based on deep learning
P. Ferrari et al.
2019 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 AND INTERNET OF THINGS (METROIND4.0&IOT) (2019)
The industrial internet of things (IIoT): An analysis framework
Hugh Boyes et al.
COMPUTERS IN INDUSTRY (2018)
Industrial Internet of Things: Challenges, Opportunities, and Directions
Emiliano Sisinni et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
IoT Architectural Framework: Connection and Integration Framework for IoT Systems
Onoriode Uviase et al.
ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE (2018)
A survey of intrusion detection in Internet of Things
Bruno Bogaz Zarpelao et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Internet of Things in Industries: A Survey
Li Da Xu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
SVELTE: Real-time intrusion detection in the Internet of Things
Shahid Raza et al.
AD HOC NETWORKS (2013)