4.7 Article

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A Blockchain-Powered Decentralized and Secure Computing Paradigm

Gihan J. Mendis et al.

Summary: The proposed decentralized, secure, and privacy-preserving computing paradigm enables an asynchronized cooperative computing process amongst distributed and untrustworthy computing nodes. This paradigm is designed by exploring blockchain, decentralized learning, and homomorphic encryption techniques.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

Article Computer Science, Information Systems

Private Machine Learning Classification Based on Fully Homomorphic Encryption

Xiaoqiang Sun et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2020)

Review Computer Science, Artificial Intelligence

Immutable autobiography of smart cars leveraging blockchain technology

Md Sadek Ferdous et al.

KNOWLEDGE ENGINEERING REVIEW (2020)

Article Computer Science, Information Systems

Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures

Ismail Butun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Security Services Using Blockchains: A State of the Art Survey

Tara Salman et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Hardware & Architecture

Internet of Things: A survey on machine learning-based intrusion detection approaches

Kelton A. P. da Costa et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Information Systems

Privacy-Preserving Machine Learning: Threats and Solutions

Mohammad Al-Rubaie et al.

IEEE SECURITY & PRIVACY (2019)

Article Computer Science, Artificial Intelligence

Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition

Gaurav Goswami et al.

INTERNATIONAL JOURNAL OF COMPUTER VISION (2019)

Article Computer Science, Information Systems

Blockchain-Based Secure Time Protection Scheme in IoT

Kai Fan et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions

Muneeb Ul Hassan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things

Nour Moustafa et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities

Meng Shen et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Survey on blockchain for Internet of Things

Xu Wang et al.

COMPUTER COMMUNICATIONS (2019)

Article Computer Science, Artificial Intelligence

Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch

Xuyang Jing et al.

INFORMATION FUSION (2019)

Review Biochemistry & Molecular Biology

Privacy in the age of medical big data

W. Nicholson Price et al.

NATURE MEDICINE (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks Detection

Omar E. Elejla et al.

COMPUTATIONAL SCIENCE AND TECHNOLOGY (2019)

Review Computer Science, Information Systems

Blockchain for AI: Review and Open Research Challenges

Khaled Salah et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Theory & Methods

DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling

Muhammad Ikram et al.

PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT (2019)

Article Computer Science, Information Systems

Applications of Blockchains in the Internet of Things: A Comprehensive Survey

Muhammad Salek Ali et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Proceedings Paper Computer Science, Information Systems

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

Benjamin Zi Hao Zhao et al.

PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)

Proceedings Paper Computer Science, Software Engineering

Authorization transparency for accountable access to IoT services

Luca Ferretti et al.

2019 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (IEEE ICIOT 2019) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Towards a Cybersecurity Investment Assessment method using Primitive Cognitive Network Process

Kevin Kam Fung Yuen

2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION (ICAIIC 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading

Muhammad Ikram et al.

WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019) (2019)

Article Computer Science, Information Systems

Network Intrusion Detection for IoT Security Based on Learning Techniques

Nadia Chaabouni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

Vikas Hassija et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Anatomy of Threats to the Internet of Things

Imran Makhdoom et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly

Fan Liang et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams

Nurzhan Zhumabekuly Aitzhan et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Review Computer Science, Hardware & Architecture

Internet of things security: A top-down survey

Djamel Eddine Kouicem et al.

COMPUTER NETWORKS (2018)

Article Engineering, Electrical & Electronic

Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing

Abebe Abeshu Diro et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Engineering, Electrical & Electronic

Secure and Energy-Efhcient Handover in Fog Networks Using Blockchain-Based DMM

Vishal Sharma et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Theory & Methods

Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

Muhamad Erza Aminanto et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Engineering, Civil

CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles

Lun Li et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)

Article Computer Science, Theory & Methods

Preserving Model Privacy for Machine Learning in Distributed Systems

Qi Jia et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2018)

Article Computer Science, Information Systems

Malware Threats and Detection for Industrial Mobile-IoT Networks

Shaila Sharmeen et al.

IEEE ACCESS (2018)

Review Computer Science, Information Systems

A Review on the Use of Blockchain for the Internet of Things

Tiago M. Fernandez-Carames et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Consortium Blockchain-Based Malware Detection in Mobile Devices

Jingjing Gu et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT

Pradip Kumar Sharma et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View

Qiang Liu et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications

Jingzhong Wang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Novel Dynamic Android Malware Detection System With Ensemble Learning

Pengbin Feng et al.

IEEE ACCESS (2018)

Review Computer Science, Information Systems

When Intrusion Detection Meets Blockchain Technology: A Review

Weizhi Meng et al.

IEEE ACCESS (2018)

Article Engineering, Electrical & Electronic

Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications

Abebe Diro et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Hardware & Architecture

Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning

Bo Feng et al.

IEEE NETWORK (2018)

Article Engineering, Electrical & Electronic

IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?

Liang Xiao et al.

IEEE SIGNAL PROCESSING MAGAZINE (2018)

Article Computer Science, Information Systems

Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things

S. Prabavathy et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2018)

Review Chemistry, Analytical

Blockchain and IoT Integration: A Systematic Survey

Alfonso Panarello et al.

SENSORS (2018)

Article Computer Science, Information Systems

A Privacy-Preserving Trust Model Based on Blockchain for VANETs

Zhaojun Lu et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Information Systems

Securing Insulin Pump System Using Deep Learning and Gesture Recognition

Usman Ahmad et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Proceedings Paper Computer Science, Interdisciplinary Applications

Incognito: A Method for Obfuscating Web Data

Rahat Masood et al.

WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) (2018)

Article Engineering, Electrical & Electronic

Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs

Tao Zhang et al.

IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS (2018)

Article Computer Science, Hardware & Architecture

Blockchain-based secure firmware update for embedded devices in an Internet of Things environment

Boohyung Lee et al.

JOURNAL OF SUPERCOMPUTING (2017)

Article Telecommunications

Physical-Layer Authentication Based on Extreme Learning Machine

Ning Wang et al.

IEEE COMMUNICATIONS LETTERS (2017)

Article Engineering, Electrical & Electronic

DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks

Pradip Kumar Sharma et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Automation & Control Systems

Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains

Jiawen Kang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Computer Science, Information Systems

Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM

Hui Zhu et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2017)

Article Computer Science, Information Systems

Machine Learning-Based Malicious Application Detection of Android

Linfeng Wei et al.

IEEE ACCESS (2017)

Article Computer Science, Hardware & Architecture

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Mohammed A. Ambusaidi et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Engineering, Electrical & Electronic

PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks

Liang Xiao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Computer Science, Information Systems

Blockchains and Smart Contracts for the Internet of Things

Konstantinos Christidis et al.

IEEE ACCESS (2016)

Article Computer Science, Hardware & Architecture

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques

Zhiyuan Tan et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)