Filters








7,850 Hits in 7.2 sec

Cybersecurity of Critical Infrastructures: Challenges and Solutions

Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag
2022 Sensors  
People's lives are becoming more and more dependent on information and computer technology [...]  ...  Conflicts of Interest: The authors declare no conflict of interest.  ...  Funding: This research received no external funding. Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable.  ... 
doi:10.3390/s22145105 pmid:35890784 pmcid:PMC9317681 fatcat:ww5uhdj5y5cbxcdvxezwe37cau

Malicious Traffic Flow Detection in IOT Using Ml Based Algorithms

Sri Vigna Hema V, Devadharshini S, Gowsalya P
2021 International Research Journal on Advanced Science Hub  
Identifying the malicious traffic flows in Internet of things (IOT) is very important to monitor and avoid unwanted errors or the unwanted flows in the network.  ...  Then, we applied multicriteria decision method called VIKOR which is used for validating the features selected for recognition the flow of traffic errors in the network.  ...  ConclusionAttack detection in the Internet of Things (IOT) network is critical for IOT security, as it keeps an eye on and blocks unwanted traffic flows.  ... 
doi:10.47392/irjash.2021.142 fatcat:pzmbtwjc2ffdplrxise6ubwa2u

Intrusion Detection System for Industrial Internet of Things Based on Deep Reinforcement Learning

Sumegh Tharewal, Mohammed Waseem Ashfaque, Sayyada Sara Banu, Perumal Uma, Samar Mansour Hassen, Mohammad Shabaz, Deepak Kumar Jain
2022 Wireless Communications and Mobile Computing  
In this manuscript, the DRL-IDS intrusion detection system is built on a feature selection method based on LightGBM, which efficiently selects the most attractive feature set from industrial Internet of  ...  To begin, the application is based on GBM's feature selection algorithm, which extracts the most compelling feature set from Industrial Internet of Things data; then, in conjunction with the deep learning  ...  feature set in the Industrial Internet of Things data; an Industrial Internet of Things intrusion detection model is constructed based on the PPO2 algorithm.  ... 
doi:10.1155/2022/9023719 fatcat:eqsmqeyh7bg6tlwu2ofxomjqfm

RESEARCH OF MACHINE LEARNING BASED METHODS FOR CYBERATTACKS DETECTION IN THE INTERNET OF THINGS INFRASTRUCTURE

KIRA BOBROVNIKOVA, MARIIA KAPUSTIAN, DMYTRO DENYSIUK
2022 Computer Systems and Information Technologies  
The latter shortcoming is the most critical, as evidenced by the constantly increasing number of cyber attacks on the Internet of Things infrastructure.  ...  Nowadays, there are many different methods of detecting cyberattacks on the Internet of Things infrastructure.  ...  In [14] , a framework for detecting traffic attacks on the Internet of Things was proposed.  ... 
doi:10.31891/csit-2021-5-15 fatcat:xdunccobhveqxbuz4soyj6qdvm

The future of Artificial Intelligence in Cybersecurity: A Comprehensive Survey

Feng Tao, Muhammad Akhtar, Zhang Jiayuan
2021 EAI Endorsed Transactions on Creative Technologies  
The increase in the incidence and quality of cyber-attacks is driving AI-enabled cyber systems.  ...  Increasing incidents of huge cyber-attacks globally have created awareness among organizations for securing their information.  ...  Some of the problems lie in the major elements of Industry 4.0 such as cyber physical systems, the Internet of things, big data and cloud computing. One is cyber security.  ... 
doi:10.4108/eai.7-7-2021.170285 fatcat:fvzohjzivzf3rgvfgtfwbm4qly

Cybersecurity in the Internet of Things in Industrial Management

Ricardo Jorge Raimundo, Albérico Travassos Rosário
2022 Applied Sciences  
The issue of cybersecurity has become paramount to the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) in mitigating cybersecurity risk for organizations and end users.  ...  Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains  ...  The authors were supported by the GOYCOPP Research Unit of Universidade de Aveiro and ISEC Lisboa, Higher Institute of Education and Sciences.  ... 
doi:10.3390/app12031598 fatcat:rnjcjlzz3ngujid6gwst5qbl2a

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu
2021 IEEE Access  
To construct a generalized model for anomaly detection in the industrial internet of things, Wang et al.  ...  Section V Federated Deep Learning for Cyber Security in the Internet of Things Research Questions Q1. What are the applications of federated deep learning in IoT networks?  ...  He has published over 80 papers in international journals and conferences in the above areas. He has been conducting several research projects with international collaborations on these topics.  ... 
doi:10.1109/access.2021.3118642 fatcat:222fgsvt3nh6zcgm5qt4kxe7c4

Recent Advances in Cyber-Physical Security in Industrial Environments

Zhihan Lv, Wojciech Mazurczyk, Steffen Wendzel, Houbing Song
2019 IEEE Transactions on Industrial Informatics  
Song was an Associate Technical Editor for IEEE COMMUNICATIONS MAGAZINE and a Guest Editor for IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, IEEE INTERNET OF THINGS JOURNAL, IEEE TRANSACTIONS ON INDUSTRIAL  ...  "A trust-based active detection for cyber-physical security in industrial environments" promotes a scheme of the active detection based on trust to promote the reliability of reducing the redundancy of  ... 
doi:10.1109/tii.2019.2945971 fatcat:j66mnvhbxvh6ve22yw4nuagkcq

IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges

Weizhi Meng, Javier Lopez, Shouhuai Xu, Chunhua Su, Rongxing Lu
2021 IEEE Access  
''Research on artificial intelligence enhancing Internet of Things security: A survey,'' reviews the complexity of IoT security protection, and then identifies that Artificial Intelligence (AI) methods  ...  In the article ''Cyber resilience in healthcare digital twin on lung cancer,'' by Zhang et al., the authors show that vulnerability detection is a fundamental technology for cyber resilience in healthcare  ... 
doi:10.1109/access.2021.3101889 fatcat:3ym72zw22jab5d3bcv4it4cyki

A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats

Yussuf Ahmed, A.Taufiq Asyhari, Md Arafatur Rahman
2021 Computers Materials & Continua  
Interconnected devices such as the Internet of Things (IoT) are also increasing attack exposures due to the increase in vulnerabilities.  ...  In this paper, we used a publicly available dataset on Advanced Persistent Threats (APT) and developed a data-driven approach for detecting APT stages using the Cyber Kill Chain.  ...  is crucial for detecting cyber-attacks in the early stages.  ... 
doi:10.32604/cmc.2021.014223 fatcat:sxc7xfhj5fcsvophwmx7wgn5ja

Security Requirements of Internet of Things-Based Healthcare System: a Survey Study

Somayeh Nasiri, Farahnaz Sadoughi, Mohammad Tadayon, Afsaneh Dehnad
2019 Acta Informatica Medica  
Internet of Things (IoT), which provides smart services and remote monitoring across healthcare systems according to a set of interconnected networks and devices, is a revolutionary technology in this  ...  A survey study on security requirements of IoT in healthcare system was conducted. Four digital databases (Web of Science, Scopus, PubMed and IEEE) were searched from 2005 to September 2019.  ...  INTRODUCTION Internet of things (IoT) as an innovative paradigm was introduced by Kevin Ashton in 1999.  ... 
doi:10.5455/aim.2019.27.253-258 pmid:32055092 pmcid:PMC7004290 fatcat:wp7wghokkndajpvm5hxwy3dury

Cyber-Physical-Social Based Security Architecture for Future Internet of Things

Huansheng Ning, Hong Liu
2012 Advances in Internet of Things  
As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT.  ...  Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural  ...  Research Funds for the Central Universities (YWF-11-02-264).  ... 
doi:10.4236/ait.2012.21001 fatcat:gi6ixyqqevg2ta5aid25nq2tee

Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review

Mujaheed Abdullahi, Yahia Baashar, Hitham Alhussian, Ayed Alwadain, Norshakirah Aziz, Luiz Fernando Capretz, Said Jadid Abdulkadir
2022 Electronics  
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0), where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have evolved exponentially  ...  This analysis also provides an insight into the AI roadmap to detect threats based on attack categories. Finally, we present recommendations for potential future investigations.  ...  Introduction The large-scale growth of the Internet of things (IoT) in recent years has contributed to a significant increase in fog computing, smart cities, and Industry 4.0, all of which execute the  ... 
doi:10.3390/electronics11020198 fatcat:fzqm47exe5dgjeqlxjhagrypoa

Critical Infrastructure Cybersecurity Challenges: IoT In Perspective [article]

Henry Matey Akwetey, Paul Danquah, Godfred Yaw Koi-Akrofi, Isaac Asampana
2022 arXiv   pre-print
A technology platform that is gradually bridging the gap between object visibility and remote accessibility is the Internet of Things (IoT).  ...  The authors concluded by discussing how the various entities in the sector can overcome these security challenges to ensure an exemplary future IoT implementation on the power critical infrastructure value  ...  Earlier research on critical infrastructures proposed a concept of abstraction ranging from the Industrial Internet Reference Architecture (IIRA) and Internet of Things Architecture [16] , without much  ... 
arXiv:2202.12970v1 fatcat:avdnq7su65b3ljfhbeyuf2s6cq

Guest Editorial Special Issue on Graph-Powered Machine Learning for Internet of Things

Zhipeng Cai, Suparna De, Michal Kedziora, Chaokun Wang
2022 IEEE Internet of Things Journal  
Honggang Wang, for providing us the opportunity to organize the special issue in the IEEE INTERNET OF THINGS.  ...  Guest Editorial Special Issue on Graph-Powered Machine Learning for Internet of Things I NTERNET of Things (IoT) refers to an ecosystem where applications and services are driven by data collected from  ... 
doi:10.1109/jiot.2022.3164812 fatcat:h2i7xh4xvveg7hlsmccvwemtve
« Previous Showing results 1 — 15 out of 7,850 results