3.8 Proceedings Paper

An Integrated Framework for Enhancing Security and Privacy in IoT-Based Business Intelligence Applications

Related references

Note: Only part of the references are listed.
Article Telecommunications

A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing

Prabhat Kumar et al.

Summary: The advancement of blockchain technology and the increasing use of Internet of Things devices are reshaping the infrastructure of smart networks. To address the security challenges posed by these developments, a new framework combining artificial intelligence techniques and distributed storage has been proposed. This framework demonstrates superior performance in detecting rare attacks in IoT systems, providing a promising solution to enhance security in blockchain-IoT applications.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Computer Science, Theory & Methods

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures

Nazar Waheed et al.

Summary: The security and privacy concerns of users have become significant as IoT devices become more involved in various applications. Machine Learning algorithms and Blockchain techniques are being used to address these issues effectively in recent years.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Information Systems

An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks

Prabhat Kumar et al.

Summary: Internet of Medical Things (IoMT), a branch of Internet of Things (IoT), provides unparalleled benefits in improving patient care quality and treatment efficiency. However, the increasing severity and frequency of cyber-attacks in IoMT environments pose significant challenges.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles

Randhir Kumar et al.

Summary: The current development of UAVs and IoT devices is revolutionizing traditional agriculture into precision agriculture, but also facing challenges in terms of internet security and data privacy. This research proposes the SP2F framework, featuring two main engines - a two-level privacy engine and a deep learning-based anomaly detection engine, which strengthen data authentication and prevent data poisoning attacks by introducing blockchain and smart contracts.

COMPUTER NETWORKS (2021)

Article Multidisciplinary Sciences

Toward Design of an Intelligent Cyber Attack Detection System using Hybrid Feature Reduced Approach for IoT Networks

Prabhat Kumar et al.

Summary: The paper introduces an intelligent cyber attack detection system for IoT networks, utilizing a novel feature reduction approach to improve detection efficiency. Experimental comparisons demonstrate the model's high accuracy and detection rate in cyber attack detection.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2021)

Review Computer Science, Information Systems

Machine Learning Models for Secure Data Analytics: A taxonomy and threat model

Rajesh Gupta et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features

Yan Naung Soe et al.

ELECTRONICS (2020)

Article Computer Science, Theory & Methods

An overview on smart contracts: Challenges, advances and platforms

Zibin Zheng et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

IoT malicious traffic identification using wrapper-based feature selection mechanisms

Muhammad Shafiq et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Theory & Methods

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city

Muhammad Shafiq et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Automation & Control Systems

A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks

Marwa Keshk et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems

Waqas Haider et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey

Shuyun Shi et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

A Conceptual Data Model and Its Automatic Implementation for IoT-Based Business Intelligence Applications

Julian Eduardo Plazas et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Smart Contract Privacy Protection Using AI in Cyber-Physical Systems: Tools, Techniques and Challenges

Rajesh Gupta et al.

IEEE ACCESS (2020)

Review Computer Science, Hardware & Architecture

Blockchain for smart communities: Applications, challenges and opportunities

Shubhani Aggarwal et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Review Computer Science, Hardware & Architecture

A survey on privacy protection in blockchain system

Qi Feng et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Review Computer Science, Hardware & Architecture

Multimedia big data computing and Internet of Things applications: A taxonomy and process model

Aparna Kumari et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Automation & Control Systems

Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid

Anish Jindal et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2016)