243 related articles for article (PubMed ID: 36772292)
1. A Survey of Machine and Deep Learning Methods for Privacy Protection in the Internet of Things.
Rodríguez E; Otero B; Canal R
Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772292
[TBL] [Abstract][Full Text] [Related]
2. Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey.
Kim K; Alshenaifi IM; Ramachandran S; Kim J; Zia T; Almorjan A
Sensors (Basel); 2023 Apr; 23(7):. PubMed ID: 37050740
[TBL] [Abstract][Full Text] [Related]
3. Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques.
Rashid MM; Kamruzzaman J; Hassan MM; Imam T; Gordon S
Int J Environ Res Public Health; 2020 Dec; 17(24):. PubMed ID: 33327468
[TBL] [Abstract][Full Text] [Related]
4. Machine learning and deep learning approaches in IoT.
Javed A; Awais M; Shoaib M; Khurshid KS; Othman M
PeerJ Comput Sci; 2023; 9():e1204. PubMed ID: 37346567
[TBL] [Abstract][Full Text] [Related]
5. A Review of Emerging Technologies for IoT-Based Smart Cities.
Whaiduzzaman M; Barros A; Chanda M; Barman S; Sultana T; Rahman MS; Roy S; Fidge C
Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36501973
[TBL] [Abstract][Full Text] [Related]
6. Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence.
Mazhar T; Talpur DB; Shloul TA; Ghadi YY; Haq I; Ullah I; Ouahada K; Hamam H
Brain Sci; 2023 Apr; 13(4):. PubMed ID: 37190648
[TBL] [Abstract][Full Text] [Related]
7. A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms.
Diro A; Chilamkurti N; Nguyen VD; Heyne W
Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960414
[TBL] [Abstract][Full Text] [Related]
8. HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Ullah S; Khan MA; Ahmad J; Jamal SS; E Huma Z; Hassan MT; Pitropakis N; Arshad ; Buchanan WJ
Sensors (Basel); 2022 Feb; 22(4):. PubMed ID: 35214241
[TBL] [Abstract][Full Text] [Related]
9. Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance.
Sahu SK; Mazumdar K
Front Artif Intell; 2024; 7():1397480. PubMed ID: 38845684
[TBL] [Abstract][Full Text] [Related]
10. PyFF: A Fog-Based Flexible Architecture for Enabling Privacy-by-Design IoT-Based Communal Smart Environments.
Benhamida FZ; Navarro J; Gómez-Carmona O; Casado-Mansilla D; López-de-Ipiña D; Zaballos A
Sensors (Basel); 2021 May; 21(11):. PubMed ID: 34073751
[TBL] [Abstract][Full Text] [Related]
11. Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection-Current Research Trends.
Rafique SH; Abdallah A; Musa NS; Murugan T
Sensors (Basel); 2024 Mar; 24(6):. PubMed ID: 38544231
[TBL] [Abstract][Full Text] [Related]
12. At the Confluence of Artificial Intelligence and Edge Computing in IoT-Based Applications: A Review and New Perspectives.
Bourechak A; Zedadra O; Kouahla MN; Guerrieri A; Seridi H; Fortino G
Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772680
[TBL] [Abstract][Full Text] [Related]
13. Machine Learning for Smart Environments in B5G Networks: Connectivity and QoS.
Alsamhi SH; Almalki FA; Al-Dois H; Ben Othman S; Hassan J; Hawbani A; Sahal R; Lee B; Saleh H
Comput Intell Neurosci; 2021; 2021():6805151. PubMed ID: 34589123
[TBL] [Abstract][Full Text] [Related]
14. Internet of Things: Evolution, Concerns and Security Challenges.
Malhotra P; Singh Y; Anand P; Bangotra DK; Singh PK; Hong WC
Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33807724
[TBL] [Abstract][Full Text] [Related]
15. Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey.
Shah Z; Ullah I; Li H; Levula A; Khurshid K
Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161838
[TBL] [Abstract][Full Text] [Related]
16. Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms.
Altulaihan E; Almaiah MA; Aljughaiman A
Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38276404
[TBL] [Abstract][Full Text] [Related]
17. Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks.
Abu Al-Haija Q
Front Big Data; 2021; 4():782902. PubMed ID: 35098112
[TBL] [Abstract][Full Text] [Related]
18. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E
Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556
[TBL] [Abstract][Full Text] [Related]
19. Security Requirements for the Internet of Things: A Systematic Approach.
Pal S; Hitchens M; Rabehaja T; Mukhopadhyay S
Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33086542
[TBL] [Abstract][Full Text] [Related]
20. Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions.
Latif S; Driss M; Boulila W; Huma ZE; Jamal SS; Idrees Z; Ahmad J
Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833594
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]