Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm

Smart devices and people existing on the internet are connected to smart objects or things in the Internet of Things (IoT) technology. To protect the user information, it is required to detect mali...

[1]  Gerhard P. Hancke,et al.  Security Challenges for User-Oriented RFID Applications within the "Internet of Things" , 2010 .

[2]  Reza Tadayoni,et al.  Cyber Security Threats to IoT Applications and Service Domains , 2017, Wireless Personal Communications.

[3]  Jun Wang,et al.  Parameter estimation for chaotic systems using a hybrid adaptive cuckoo search with simulated annealing algorithm. , 2014, Chaos.

[4]  Joseph Alexander Brown,et al.  A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures , 2020, Comput..

[5]  Rocky K. C. Chang,et al.  Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..

[6]  Francesco Palmieri,et al.  Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios , 2019, J. Syst. Archit..

[7]  Jemal H. Abawajy,et al.  Identifying cyber threats to mobile-IoT applications in edge computing paradigm , 2018, Future Gener. Comput. Syst..

[8]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[9]  Li D. Xu Information architecture for supply chain quality management , 2011 .

[10]  M. Abliz Internet Denial of Service Attacks and Defense Mechanisms , 2011 .

[11]  Didier Colle,et al.  Intelligent optical networking for multilayer survivability , 2002 .

[12]  Hong Yu,et al.  Estimation of Surface Duct Using Ground-Based GPS Phase Delay and Propagation Loss , 2018, Remote. Sens..

[13]  RomanRodrigo,et al.  Securing the Internet of Things , 2011 .

[14]  Ravneet Kaur Advances in Intrusion Detection System for WLAN , 2011, Adv. Internet Things.

[15]  Hong Liu,et al.  Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.

[16]  Jong Hyuk Park,et al.  Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..

[17]  Ali Ismail Awad,et al.  Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes , 2018, Sensors.

[18]  Amir Hossein Gandomi,et al.  Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems , 2011, Engineering with Computers.

[19]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[20]  Muhammad Ahsan Latif,et al.  Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach , 2019, IEEE Access.

[21]  D. Calafiore,et al.  Medial Displacement Calcaneal Osteotomy for Unilateral Adult Acquired Flatfoot: Effects of Minimally Invasive Surgery on Pain, Alignment, Functioning, and Quality of Life. , 2020, The Journal of foot and ankle surgery : official publication of the American College of Foot and Ankle Surgeons.

[22]  Ali Dehghantanha,et al.  Fuzzy pattern tree for edge malware detection and categorization in IoT , 2019, J. Syst. Archit..

[23]  Zeyar Aung,et al.  Real-time anomaly-based distributed intrusion detection systems for advanced Metering Infrastructure utilizing stream data mining , 2015, 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE).

[24]  Wei Chen,et al.  An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking , 2018, IEEE Access.

[25]  Venkatasamy Sureshkumar,et al.  IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics , 2018, Wirel. Pers. Commun..

[26]  Matluba Khodjaeva,et al.  Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography , 2019, Security, Privacy and Trust in the IoT Environment.

[27]  Marilyn Wolf,et al.  Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems , 2018, Proceedings of the IEEE.

[28]  Mohammad Shojafar,et al.  LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT , 2019, Future Gener. Comput. Syst..

[29]  Jianhua Ma,et al.  Scalable platforms and advanced algorithms for IoT and cyber-enabled applications , 2018, J. Parallel Distributed Comput..

[30]  Chakib Bekara,et al.  Security Issues and Challenges for the IoT-based Smart Grid , 2014, FNC/MobiSPC.

[31]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[32]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[33]  Samson Hansen Sackey,et al.  Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems , 2020 .