290 related articles for article (PubMed ID: 33672108)
1. Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks.
Essop I; Ribeiro JC; Papaioannou M; Zachos G; Mantas G; Rodriguez J
Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33672108
[TBL] [Abstract][Full Text] [Related]
2. Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.
Abosata N; Al-Rubaye S; Inalhan G
Sensors (Basel); 2022 Dec; 23(1):. PubMed ID: 36616920
[TBL] [Abstract][Full Text] [Related]
3. Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications.
Abosata N; Al-Rubaye S; Inalhan G; Emmanouilidis C
Sensors (Basel); 2021 May; 21(11):. PubMed ID: 34073975
[TBL] [Abstract][Full Text] [Related]
4. Efficient Anomaly Detection for Smart Hospital IoT Systems.
Said AM; Yahyaoui A; Abdellatif T
Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33546169
[TBL] [Abstract][Full Text] [Related]
5. Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection.
Zegarra Rodríguez D; Daniel Okey O; Maidin SS; Umoren Udo E; Kleinschmidt JH
PLoS One; 2023; 18(10):e0286652. PubMed ID: 37844095
[TBL] [Abstract][Full Text] [Related]
6. Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset.
Choudhary V; Tanwar S; Choudhury T; Kotecha K
MethodsX; 2024 Jun; 12():102747. PubMed ID: 38774685
[TBL] [Abstract][Full Text] [Related]
7. ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.
Mahalingam A; Perumal G; Subburayalu G; Albathan M; Altameem A; Almakki RS; Hussain A; Abbas Q
Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836874
[TBL] [Abstract][Full Text] [Related]
8. Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks.
Benaddi H; Jouhari M; Ibrahimi K; Ben Othman J; Amhoud EM
Sensors (Basel); 2022 Oct; 22(21):. PubMed ID: 36365782
[TBL] [Abstract][Full Text] [Related]
9. A Framework for Malicious Traffic Detection in IoT Healthcare Environment.
Hussain F; Abbas SG; Shah GA; Pires IM; Fayyaz UU; Shahzad F; Garcia NM; Zdravevski E
Sensors (Basel); 2021 Apr; 21(9):. PubMed ID: 33925813
[TBL] [Abstract][Full Text] [Related]
10. A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things.
Almaiah MA; Ali A; Hajjej F; Pasha MF; Alohali MA
Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336282
[TBL] [Abstract][Full Text] [Related]
11. Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey.
Tan SF; Samsudin A
Sensors (Basel); 2021 Oct; 21(19):. PubMed ID: 34640967
[TBL] [Abstract][Full Text] [Related]
12. IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses.
Albulayhi K; Smadi AA; Sheldon FT; Abercrombie RK
Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640752
[TBL] [Abstract][Full Text] [Related]
13. A Panorama of Cloud Platforms for IoT Applications Across Industries.
Yangui S
Sensors (Basel); 2020 May; 20(9):. PubMed ID: 32397423
[TBL] [Abstract][Full Text] [Related]
14. Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection-Current Research Trends.
Rafique SH; Abdallah A; Musa NS; Murugan T
Sensors (Basel); 2024 Mar; 24(6):. PubMed ID: 38544231
[TBL] [Abstract][Full Text] [Related]
15. SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks.
Baz M
Sensors (Basel); 2022 Aug; 22(17):. PubMed ID: 36080962
[TBL] [Abstract][Full Text] [Related]
16. Modified graph-based algorithm to analyze security threats in IoT.
Arat F; Akleylek S
PeerJ Comput Sci; 2023; 9():e1743. PubMed ID: 38192462
[TBL] [Abstract][Full Text] [Related]
17. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
Gyamfi E; Jurcut A
Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632153
[TBL] [Abstract][Full Text] [Related]
18. A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models.
Rabie OBJ; Selvarajan S; Hasanin T; Alshareef AM; Yogesh CK; Uddin M
Sci Rep; 2024 Jan; 14(1):386. PubMed ID: 38172185
[TBL] [Abstract][Full Text] [Related]
19. A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry.
Farooq MS; Abdullah M; Riaz S; Alvi A; Rustam F; Flores MAL; Galán JC; Samad MA; Ashraf I
Sensors (Basel); 2023 Nov; 23(21):. PubMed ID: 37960657
[TBL] [Abstract][Full Text] [Related]
20. Sliding principal component and dynamic reward reinforcement learning based IIoT attack detection.
Ellappan V; Mahendran A; Subramanian M; Jotheeswaran J; Khadidos AO; Khadidos AO; Selvarajan S
Sci Rep; 2023 Nov; 13(1):20843. PubMed ID: 38012161
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]