Machine Learning in IoT Security: Current Solutions and Future Challenges
暂无分享,去创建一个
Syed Ali Hassan | Ekram Hossain | Fatima Hussain | Rasheed Hussain | E. Hossain | Fatima Hussain | Rasheed Hussain
[1] Pooja Jadav,et al. Fuzzy logic based faulty node detection in Wireless Sensor Network , 2017, 2017 International Conference on Communication and Signal Processing (ICCSP).
[2] Fatima. Hussain. Internet of Things: Building Blocks and Business Models , 2017 .
[3] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[4] Vijay Varadharajan,et al. A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.
[5] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[6] Abbas Javed,et al. Intelligent Intrusion Detection in Low-Power IoTs , 2016, ACM Trans. Internet Techn..
[7] Wei Xiang,et al. Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.
[8] Hicham Lakhlef,et al. Internet of things security: A top-down survey , 2018, Comput. Networks.
[9] Wei Ni,et al. Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[10] Atul Prakash,et al. Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? , 2017, IEEE Security & Privacy.
[11] Pieter C. van den Toorn,et al. A brief survey , 2012 .
[12] Syed Ali Hassan,et al. Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges , 2019, IEEE Communications Surveys & Tutorials.
[13] Xiaoqing Han,et al. Review on the research and practice of deep learning and reinforcement learning in smart grids , 2018, CSEE Journal of Power and Energy Systems.
[14] Xiaojiang Du,et al. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.
[15] Laurence T. Yang,et al. A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion , 2019, Inf. Fusion.
[16] Jin Li,et al. The security of machine learning in an adversarial setting: A survey , 2019, J. Parallel Distributed Comput..
[17] Lianbing Deng,et al. Information security model of block chain based on intrusion sensing in the IoT environment , 2018, Cluster Computing.
[18] Han Yu,et al. Energy-efficient and security-optimized AES hardware design for ubiquitous computing* , 2008 .
[19] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[20] Jin Ye,et al. A DDoS Attack Detection Method Based on SVM in Software Defined Network , 2018, Secur. Commun. Networks.
[21] Prachi Shukla,et al. ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things , 2017, 2017 Intelligent Systems Conference (IntelliSys).
[22] Marenglen Biba,et al. Machine learning for intrusion detection in MANET: a state-of-the-art survey , 2015, Journal of Intelligent Information Systems.
[23] Georgios Kambourakis,et al. The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[24] Shrideep Pallickara,et al. NEPTUNE: Real Time Stream Processing for Internet of Things and Sensing Environments , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS).
[25] Victor I. Chang,et al. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..
[26] Sven Dietrich,et al. Security Challenges and Opportunities of Software-Defined Networking , 2017, IEEE Security & Privacy.
[27] Malay K. Pakhira,et al. A Linear Time-Complexity k-Means Algorithm Using Cluster Shifting , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.
[28] Andreas Spanias,et al. A brief survey of machine learning methods and their sensor and IoT applications , 2017, 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA).
[29] Audrey A. Gendreau,et al. Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[30] David M. Eyers,et al. Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.
[31] GardinerJoseph,et al. On the Security of Machine Learning in Malware C&C Detection , 2016 .
[32] Abdelouahid Derhab,et al. MalDozer: Automatic framework for android malware detection using deep learning , 2018, Digit. Investig..
[33] Xianbin Wang,et al. Machine Intelligence Techniques for Next-Generation Context-Aware Wireless Networks , 2018, ArXiv.
[34] Ali Dehghantanha,et al. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[35] Hwee Pink Tan,et al. Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.
[36] Chunhua Wang,et al. Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.
[37] Asaf Shabtai,et al. MDGAN: Boosting Anomaly Detection Using Multi-Discriminator Generative Adversarial Networks , 2018, ArXiv.
[38] Wei Cai,et al. A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.
[39] Guangxia Xu,et al. SDN-Based Data Transfer Security for Internet of Things , 2018, IEEE Internet of Things Journal.
[40] Gabriel Dulac-Arnold,et al. Challenges of Real-World Reinforcement Learning , 2019, ArXiv.
[41] Sukumar Mishra,et al. Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks , 2018, Journal of Medical Systems.
[42] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[43] Myung-Sup Kim,et al. Linear SVM-Based Android Malware Detection for Reliable IoT Services , 2014, J. Appl. Math..
[44] Robert H. Deng,et al. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.
[45] Amir Masoud Rahmani,et al. Internet of Things applications: A systematic review , 2019, Comput. Networks.
[46] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[47] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[48] Harsh Kupwade Patil,et al. Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.
[49] Yixian Yang,et al. Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.
[50] Pei-Yu Chiang,et al. Cloud-Based Fine-Grained Health Information Access Control Framework for LightweightIoT Devices with Dynamic Auditing andAttribute Revocation , 2018, IEEE Transactions on Cloud Computing.
[51] Altair Olivo Santin,et al. A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems , 2018, Comput. Secur..
[52] Mohsen Guizani,et al. Semisupervised Deep Reinforcement Learning in Support of IoT and Smart City Services , 2018, IEEE Internet of Things Journal.
[53] Wenchang Shi,et al. A survey on internet of things security from data perspectives , 2019, Comput. Networks.
[54] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[55] Zhuzhong Qian,et al. AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks , 2017, J. Parallel Distributed Comput..
[56] Sergey Levine,et al. MBMF: Model-Based Priors for Model-Free Reinforcement Learning , 2017, ArXiv.
[57] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[58] Shaohan Hu,et al. Deep Learning for the Internet of Things , 2018, Computer.
[59] Francesco Palmieri,et al. Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT , 2018, Comput. Secur..
[60] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[61] Qihui Wu,et al. A survey of machine learning for big data processing , 2016, EURASIP Journal on Advances in Signal Processing.
[62] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[63] Nick Feamster,et al. Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[64] Hongxin Hu,et al. Rallying Adversarial Techniques against Deep Learning for Network Security , 2019, 2021 IEEE Symposium Series on Computational Intelligence (SSCI).
[65] Roberto Baldoni,et al. Survey on the Usage of Machine Learning Techniques for Malware Analysis , 2017, Comput. Secur..
[66] Jia Guo,et al. A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..
[67] Mingyang Li,et al. Poster Abstract: Unsupervised Anomaly Detection via Generative Adversarial Networks , 2019, 2019 18th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[68] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[69] F. Richard Yu,et al. A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things , 2018, IEEE Communications Magazine.
[70] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[71] Lei Shi,et al. MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks , 2019, ICANN.
[72] Yi Shi,et al. IoT Network Security from the Perspective of Adversarial Deep Learning , 2019, 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[73] Jong Hyuk Park,et al. Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..
[74] Rong Zheng,et al. Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.
[75] Athanasios V. Vasilakos,et al. Software-Defined Networking for Internet of Things: A Survey , 2017, IEEE Internet of Things Journal.
[76] Fidel Paniagua Diez,et al. Modeling XACML Security Policies Using Graph Databases , 2017, IT Professional.
[77] Jaime Lloret Mauri,et al. Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks , 2015, Comput. J..
[78] Arputharaj Kannan,et al. A comprehensive presentation to XACML , 2013 .
[79] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[80] Mohammed Anbar,et al. Internet of Things (IoT) communication protocols: Review , 2017, 2017 8th International Conference on Information Technology (ICIT).
[81] Johannes Fürnkranz,et al. A Survey of Preference-Based Reinforcement Learning Methods , 2017, J. Mach. Learn. Res..
[82] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[83] Walaa Hamouda,et al. A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.
[84] Kun Yang,et al. A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework , 2018, IEEE Access.
[85] Xiangjian He,et al. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.
[86] Amos Azaria,et al. Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data , 2014, IEEE Transactions on Computational Social Systems.
[87] Rodrigo Roman,et al. On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.
[88] Zhaohui Tang,et al. Taxonomy on malware evasion countermeasures techniques , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).
[89] Joshua B. Tenenbaum,et al. Building machines that learn and think like people , 2016, Behavioral and Brain Sciences.
[90] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[91] Ali A. Ghorbani,et al. Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.
[92] S. Thamarai Selvi,et al. DDoS detection and analysis in SDN-based environment using support vector machine classifier , 2014, 2014 Sixth International Conference on Advanced Computing (ICoAC).
[93] Sergey Levine,et al. Model-Based Value Estimation for Efficient Model-Free Reinforcement Learning , 2018, ArXiv.
[94] Abishi Chowdhury,et al. A survey study on Internet of Things resource management , 2018, J. Netw. Comput. Appl..
[95] Miriam A. M. Capretz,et al. Machine Learning With Big Data: Challenges and Approaches , 2017, IEEE Access.
[96] Vangelis Gazis,et al. A Survey of Standards for Machine-to-Machine and the Internet of Things , 2017, IEEE Communications Surveys & Tutorials.
[97] Mohsen Guizani,et al. Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges , 2016, IEEE Wireless Communications.
[98] Vasiliy Krundyshev,et al. Evaluation of GAN Applicability for Intrusion Detection in Self-Organizing Networks of Cyber Physical Systems , 2018, 2018 International Russian Automation Conference (RusAutoCon).
[99] Marc G. Bellemare,et al. Distributional Reinforcement Learning with Quantile Regression , 2017, AAAI.
[100] Parvez Ahammad,et al. SoK: Applying Machine Learning in Security - A Survey , 2016, ArXiv.
[101] F. Richard Yu,et al. Automatically synthesizing DoS attack traces using generative adversarial networks , 2019, Int. J. Mach. Learn. Cybern..
[102] Mohammed S. Alam,et al. Random Forest Classification for Detecting Android Malware , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[103] Jerker Delsing,et al. An authentication and access control framework for CoAP-based Internet of Things , 2014, IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society.
[104] Byung-Seo Kim,et al. Internet of Things (IoT) Operating Systems Support, Networking Technologies, Applications, and Challenges: A Comparative Review , 2018, IEEE Communications Surveys & Tutorials.
[105] Abhijit Mondal,et al. A reliable, multi-path, connection oriented and independent transport protocol for IoT networks , 2017, 2017 9th International Conference on Communication Systems and Networks (COMSNETS).
[106] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[107] Ai Yano,et al. IoT fault management platform with device virtualization , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).
[108] José M. F. Moura,et al. A Deep Learning Approach to IoT Authentication , 2018, 2018 IEEE International Conference on Communications (ICC).
[109] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[110] Bin Yu,et al. A cloud-assisted malware detection and suppression framework for wireless multimedia system in IoT based on dynamic differential game , 2018, China Communications.
[111] Zhu Han,et al. PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead , 2018, IEEE Transactions on Wireless Communications.
[112] Atul Prakash,et al. Robust Physical-World Attacks on Machine Learning Models , 2017, ArXiv.
[113] Indrajit Banerjee,et al. Non-parametric sequence-based learning approach for outlier detection in IoT , 2017, Future Gener. Comput. Syst..
[114] Bruno Volckaert,et al. Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures , 2018, J. Netw. Comput. Appl..
[115] Ali Dehghantanha,et al. Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.
[116] Moussa Ayyash,et al. Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks , 2018, IEEE Internet of Things Journal.
[117] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[118] Haoyang Yu,et al. Exploiting ICN for Realizing Service-Oriented Communication in IoT , 2016, IEEE Communications Standards.
[119] M. V. Vijayakumar,et al. Reinforcement Learning Algorithms: Survey and Classification , 2017 .
[120] Amir Hussain,et al. Applications of Deep Learning and Reinforcement Learning to Biological Data , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[121] Alexey Finogeev,et al. Information attacks and security in wireless sensor networks of industrial SCADA systems , 2017, J. Ind. Inf. Integr..
[122] Andrew H. Sung,et al. Intrusion Detection Systems Using Adaptive Regression Splines , 2004, ICEIS.
[123] Munam Ali Shah,et al. E-Lithe: A Lightweight Secure DTLS for IoT , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[124] Sakir Sezer,et al. Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).
[125] Aziz Mohaisen,et al. Breaking graph-based IoT malware detection systems using adversarial examples: poster , 2019, WiSec.
[126] Sherali Zeadally,et al. Autonomous Cars: Research Results, Issues, and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.
[127] Sidi-Mohammed Senouci,et al. A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology , 2016, 2016 IEEE International Conference on Communications (ICC).
[128] Luis Muñoz-González,et al. Poisoning Attacks with Generative Adversarial Nets , 2019, ArXiv.
[129] Cristina Alcaraz,et al. A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.
[130] Maryline Laurent-Maknavicius,et al. Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.
[131] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[132] Seddik Bri,et al. High speed efficient advanced encryption standard implementation , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).
[133] Anthony Skjellum,et al. Using machine learning to secure IoT systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[134] Ioannis G. Askoxylakis,et al. Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).
[135] Walid Saad,et al. Learning How to Communicate in the Internet of Things: Finite Resources and Heterogeneity , 2016, IEEE Access.
[136] Igor Radusinovic,et al. Software-Defined Fog Network Architecture for IoT , 2016, Wireless Personal Communications.
[137] Eduardo Alchieri,et al. Evaluation of Distributed Denial of Service threat in the Internet of Things , 2016, 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA).
[138] Ivan Marsá-Maestre,et al. Applying an Unified Access Control for IoT-based Intelligent Agent Systems , 2015, 2015 IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA).
[139] Mesud Hadzialic,et al. Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues , 2018, Comput. Networks.
[140] Steven C. H. Hoi,et al. Malicious URL Detection using Machine Learning: A Survey , 2017, ArXiv.
[141] Amit P. Sheth,et al. Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.
[142] Yanfang Ye,et al. Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense , 2017, 2017 European Intelligence and Security Informatics Conference (EISIC).
[143] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[144] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[145] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[146] João Paulo Papa,et al. Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.
[147] Nicholas D. Lane,et al. DeepEar: robust smartphone audio sensing in unconstrained acoustic environments using deep learning , 2015, UbiComp.
[148] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[149] Ted H. Szymanski. Security and Privacy for a Green Internet of Things , 2017, IT Professional.
[150] Archan Misra,et al. Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks , 2018, Computer.
[151] Solmaz Niknam,et al. Federated Learning for Wireless Communications: Motivation, Opportunities, and Challenges , 2019, IEEE Communications Magazine.
[152] Zhifeng Zhao,et al. AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks , 2018, IEEE Internet of Things Journal.
[153] Xin Chen,et al. An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things , 2017, IEEE Access.
[154] Natalija Vlajic,et al. IoT as a Land of Opportunity for DDoS Hackers , 2018, Computer.
[155] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[156] Heekuck Oh,et al. On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications , 2014, Wirel. Pers. Commun..
[157] Lianbing Deng,et al. Mobile network intrusion detection for IoT system based on transfer learning algorithm , 2018, Cluster Computing.
[158] Weisong Shi,et al. On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..
[159] Vern Paxson,et al. An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.
[160] Hongbo Liu,et al. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT , 2017, MobiHoc.
[161] Ouajdi Korbaa,et al. A survey on attacks in Internet of Things based networks , 2017, 2017 International Conference on Engineering & MIS (ICEMIS).
[162] Hong Wen,et al. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.
[163] Nour Moustafa,et al. Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions , 2019, IEEE Access.
[164] Abdullah Al-Dujaili,et al. Adversarial Deep Learning for Robust Detection of Binary Encoded Malware , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[165] Saeid Nahavandi,et al. System Design Perspective for Human-Level Agents Using Deep Reinforcement Learning: A Survey , 2017, IEEE Access.
[166] Michalis Faloutsos,et al. Behavioral anomaly detection of malware on home routers , 2017, 2017 12th International Conference on Malicious and Unwanted Software (MALWARE).
[167] Hajar Mousannif,et al. Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.
[168] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[169] Yuval Elovici,et al. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.
[170] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[171] Reid G. Simmons,et al. Complexity Analysis of Real-Time Reinforcement Learning , 1993, AAAI.
[172] Denis Reilly,et al. An access control management protocol for Internet of Things devices , 2017, Netw. Secur..
[173] Lei Yang,et al. Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices , 2014, MobiCom.
[174] I. Johnstone,et al. Sparse Principal Components Analysis , 2009, 0901.4392.
[175] Marc Peter Deisenroth,et al. Deep Reinforcement Learning: A Brief Survey , 2017, IEEE Signal Processing Magazine.
[176] Tao Jiang,et al. Deep learning for wireless physical layer: Opportunities and challenges , 2017, China Communications.
[177] Manuel López Martín,et al. Adversarial environment reinforcement learning algorithm for intrusion detection , 2019, Comput. Networks.
[178] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[179] Alagan Anpalagan,et al. Resource allocation and congestion control in clustered M2M communication using Q‐learning , 2017, Trans. Emerg. Telecommun. Technol..
[180] Walid Saad,et al. Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[181] Yue Tan,et al. Deep Reinforcement Learning for Autonomous Internet of Things: Model, Applications and Challenges , 2019, IEEE Communications Surveys & Tutorials.
[182] Patrick D. McDaniel,et al. Machine Learning in Adversarial Settings , 2016, IEEE Security & Privacy.
[183] Ali Dehghantanha,et al. A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..
[184] H. Vincent Poor,et al. Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[185] Tarik Taleb,et al. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.
[186] Carl A. Gunter,et al. Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps , 2017, ACSAC.
[187] Martin Hasler,et al. Distributed machine learning in networks by consensus , 2014, Neurocomputing.
[188] Ganesh K. Venayagamoorthy,et al. Neural network based secure media access control protocol for wireless sensor networks , 2009, 2009 International Joint Conference on Neural Networks.
[189] Jürgen Schmidhuber,et al. World Models , 2018, ArXiv.
[190] Gaurav Bansod,et al. Implementation of a New Lightweight Encryption Design for Embedded Security , 2015, IEEE Transactions on Information Forensics and Security.
[191] Weizhi Meng,et al. Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling , 2018, Computer.
[192] Miika Komu,et al. Capillary networks - bridging the cellular and IoT worlds , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[193] Jemal H. Abawajy,et al. Identifying cyber threats to mobile-IoT applications in edge computing paradigm , 2018, Future Gener. Comput. Syst..
[194] Terrance E. Boult,et al. A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions , 2016, IEEE Communications Surveys & Tutorials.
[195] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[196] Kouichi Sakurai,et al. Lightweight Classification of IoT Malware Based on Image Recognition , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[197] Chunhua Jin,et al. Practical access control for sensor networks in the context of the Internet of Things , 2016, Comput. Commun..
[198] Anton O. Prokofiev,et al. A method to detect Internet of Things botnets , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).
[199] Debayan Das,et al. RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.
[200] Tommaso Melodia,et al. Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking , 2018, IEEE Internet of Things Journal.
[201] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[202] Luca Veltri,et al. IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios , 2015, IEEE Sensors Journal.
[203] Sherali Zeadally,et al. Autonomous Cars: Social and Economic Implications , 2018, IT Professional.
[204] Yuval Elovici,et al. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..
[205] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[206] Ran Wolff,et al. Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .
[207] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[208] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[209] André C. Drummond,et al. A Survey of Random Forest Based Methods for Intrusion Detection Systems , 2018, ACM Comput. Surv..
[210] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[211] Wei Dong,et al. Robust and Secure Time-Synchronization Against Sybil Attacks for Sensor Networks , 2015, IEEE Transactions on Industrial Informatics.
[212] Bo Li,et al. Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach , 2017, Comput. Secur..
[213] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[214] Mianxiong Dong,et al. Deep Reinforcement Scheduling for Mobile Crowdsensing in Fog Computing , 2019, ACM Trans. Internet Techn..
[215] Zilong Ye,et al. Secure the internet of things with challenge response authentication in fog computing , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).
[216] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[217] James Moos. IoT, Malware and Security , 2017 .
[218] Mianxiong Dong,et al. Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.
[219] Long Hu,et al. Privacy-aware service placement for mobile edge computing via federated learning , 2019, Inf. Sci..
[220] Goran Vojkovic. Will the GDPR slow down development of smart cities? , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[221] Chao Li,et al. Privacy in Internet of Things: From Principles to Technologies , 2018, IEEE Internet of Things Journal.
[222] Fagen Li,et al. Efficient certificateless access control for industrial Internet of Things , 2017, Future Gener. Comput. Syst..