Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions
暂无分享,去创建一个
Deepak Kumar Sharma | Koyel Datta Gupta | Vidushi Vashishth | Anshuman Chhabra | Shrid Pant | Mehul Sharma | K. D. Gupta | Devender Kumar Sharma | Mehul Sharma | Anshuman Chhabra | Vidushi Vashishth | Shrid Pant
[1] Fadi Al-Turjman,et al. Machine learning for wearable IoT‐based applications: A survey , 2019, Trans. Emerg. Telecommun. Technol..
[2] Lav Gupta,et al. Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things , 2019, IEEE Internet of Things Journal.
[3] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[4] K. Werbach. The Blockchain and the New Architecture of Trust , 2018 .
[5] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[6] Martin A. Riedmiller,et al. Advanced supervised learning in multi-layer perceptrons — From backpropagation to adaptive learning algorithms , 1994 .
[7] Roberto Therón,et al. UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs , 2018, Comput. Secur..
[8] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[9] Michael J. Coblenz. Obsidian: A Safer Blockchain Programming Language , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
[10] Abdelmadjid Bouabdallah,et al. TAS-IoT: Trust-Based Adaptive Security in the IoT , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).
[11] Salil S. Kanhere,et al. BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.
[12] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[13] Shu Yang,et al. A survey on application of machine learning for Internet of Things , 2018, International Journal of Machine Learning and Cybernetics.
[14] Fadi Al-Turjman,et al. Task scheduling in cloud‐based survivability applications using swarm optimization in IoT , 2018, Trans. Emerg. Telecommun. Technol..
[15] Deepak Gupta,et al. An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy , 2020, Future Gener. Comput. Syst..
[16] John S. Baras,et al. Interest, energy and physical-aware coalition formation and resource allocation in smart IoT applications , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).
[17] Sherali Zeadally,et al. Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 , 2018, IEEE Transactions on Industrial Informatics.
[18] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[19] Jugal K. Kalita,et al. Towards Generating Real-life Datasets for Network Intrusion Detection , 2015, Int. J. Netw. Secur..
[20] Walid Saad,et al. Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things , 2017, 2018 IEEE International Conference on Communications (ICC).
[21] Ali Dehghantanha,et al. A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..
[22] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[23] Deepak Gupta,et al. Automated detection and classification of fundus diabetic retinopathy images using synergic deep learning model , 2020, Pattern Recognit. Lett..
[24] Hsiao-Hwa Chen,et al. An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.
[25] Deepak Kumar Sharma,et al. A Machine Learning Approach Using Classifier Cascades for Optimal Routing in Opportunistic Internet of Things Networks , 2019, 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[26] Salim Hariri,et al. Anomaly behavior analysis for IoT sensors , 2018, Trans. Emerg. Telecommun. Technol..
[27] D. Janakiram,et al. Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[28] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[29] Saakshi Bhargava,et al. Internet of Things and Blockchain: Integration, Need, Challenges, Applications, and Future Scope , 2020 .
[30] Hwee Pink Tan,et al. Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.
[31] Deepak Kumar Sharma,et al. IoT Architecture for Preventive Energy Conservation of Smart Buildings , 2019, Energy Conservation for IoT Devices.
[32] Mohamed Hamdi,et al. Game-based adaptive security in the Internet of Things for eHealth , 2014, 2014 IEEE International Conference on Communications (ICC).
[33] Andrei Petrovski,et al. Botnet Detection in the Internet of Things using Deep Learning Approaches , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).
[34] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[35] Joel J. P. C. Rodrigues,et al. Adapting weather conditions based IoT enabled smart irrigation technique in precision agriculture mechanisms , 2018, Neural Computing and Applications.
[36] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[37] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[38] Ran Wolff,et al. Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .
[39] Samuel Greengard,et al. The Internet of Things , 2015 .
[40] Deepak Kumar Sharma,et al. Cryptocurrency Mechanisms for Blockchains: Models, Characteristics, Challenges, and Applications , 2020 .
[41] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[42] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[43] Amit Kumar Jaiswal,et al. Identifying pneumonia in chest X-rays: A deep learning approach , 2019, Measurement.
[44] Ashish Khanna,et al. Immigration Control and Management System Using Blockchain , 2020, SSRN Electronic Journal.