Open Access
Issue
MATEC Web Conf.
Volume 392, 2024
International Conference on Multidisciplinary Research and Sustainable Development (ICMED 2024)
Article Number 01166
Number of page(s) 9
DOI https://doi.org/10.1051/matecconf/202439201166
Published online 18 March 2024
  1. Malathi, C. and Padmaja, I.N., 2023. Identification of cyber attacks using machine learning in smart IoT networks. Materials Today: Proceedings, 80, pp.2518-2523. [CrossRef] [Google Scholar]
  2. Jahromi, A.N., Karimipour, H., Dehghantanha, A. and Choo, K.K.R., 2021. Toward detection and attribution of cyber-attacks in IoT-enabled cyber–physical systems. IEEE Internet of Things Journal, 8(17), pp.13712-13722. [CrossRef] [Google Scholar]
  3. Koroniotis, N., Moustafa, N., Sitnikova, E. and Turnbull, B., 2019. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems, 100, pp.779-796. [CrossRef] [Google Scholar]
  4. Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D. and Elovici, Y., 2018. N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), pp.12-22. [CrossRef] [Google Scholar]
  5. Alohali, M.A., Elsadig, M., Al-Wesabi, F.N., Al Duhayyim, M., Hilal, A.M. and Motwakel, A., 2023. Swarm intelligence for IoT attack detection in fog-enabled cyberphysical system. Computers and Electrical Engineering, 108, p.108676. [CrossRef] [Google Scholar]
  6. Dalal, S., Lilhore, U.K., Faujdar, N., Simaiya, S., Ayadi, M., Almujally, N.A. and Ksibi, A., 2023. Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree. Journal of Cloud Computing, 12(1), p.137. [CrossRef] [Google Scholar]
  7. Al-Hamadi, H., Chen, R., Wang, D.C. and Almashan, M., 2020. Attack and defense strategies for intrusion detection in autonomous distributed IoT systems. IEEE Access, 8, pp.168994-169009. [CrossRef] [Google Scholar]
  8. Doshi, K., Yilmaz, Y. and Uludag, S., 2021. Timely detection and mitigation of stealthy DDoS attacks via IoT networks. IEEE Transactions on Dependable and Secure Computing, 18(5), pp.2164-2176. [Google Scholar]
  9. Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M. and Song, H., 2021. MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Internet of Things Journal, 9(9), pp.6611-6622. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.