A Comprehensive Study of IoT Security Risks in Building a Secure Smart City
暂无分享,去创建一个
Akansha Bhargava | Prerna Goswami | Gauri Salunkhe | Sushant Bhargava | Akansha Bhargava | Gauri Salunkhe | P. Goswami | Sushant Bhargava
[1] Daphne Koller,et al. Support Vector Machine Active Learning with Applications to Text Classification , 2000, J. Mach. Learn. Res..
[2] Anil Kumar Verma,et al. SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs , 2020, Wireless Personal Communications.
[3] Md Zahangir Alom,et al. Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).
[4] Mianxiong Dong,et al. Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.
[5] Paul Geladi,et al. Principal Component Analysis , 1987, Comprehensive Chemometrics.
[6] Menachem Domb,et al. Lightweight adaptive Random-Forest for IoT rule generation and execution , 2017, J. Inf. Secur. Appl..
[7] Gisung Kim,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..
[8] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[9] Simon A. Dobson,et al. Adaptive middleware for autonomic systems , 2006, Ann. des Télécommunications.
[10] Sandip Ray,et al. The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction , 2016, IEEE Design & Test.
[11] Piyush Kumar Shukla,et al. Improved Malware Detection Technique Using Ensemble Based Classifier and Graph Theory , 2015, 2015 IEEE International Conference on Computational Intelligence & Communication Technology.
[12] Vallipuram Muthukkumarasamy,et al. Securing Smart Cities Using Blockchain Technology , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[13] Lemuria Carter,et al. literature review of RFID-enabled healthcare applications and issues amuel , 2013 .
[14] Paul Smolensky,et al. Information processing in dynamical systems: foundations of harmony theory , 1986 .
[15] Jong Hyuk Park,et al. Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..
[16] Abdul Razaque,et al. Deep recurrent neural network for IoT intrusion detection system , 2020, Simul. Model. Pract. Theory.
[17] Windu Gata,et al. Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm , 2017, 2017 11th International Conference on Information & Communication Technology and System (ICTS).
[18] Quan Z. Sheng,et al. Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies , 2020, IEEE Communications Surveys & Tutorials.
[19] Robert H. Deng,et al. Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data , 2019, IEEE Internet of Things Journal.
[20] Dang Hai Hoang,et al. A PCA-based method for IoT network traffic anomaly detection , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[21] J. Paulo Davim,et al. Handbook of IoT and Big Data , 2019 .
[22] Syed Ali Hassan,et al. Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.
[23] Bayu Adhi Tama,et al. Anomaly detection using random forest: A performance revisited , 2017, 2017 International Conference on Data and Software Engineering (ICoDSE).
[24] Daniel L. Marino,et al. Generalization of Deep Learning for Cyber-Physical System Security: A Survey , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[25] Furkan Yusuf Yavuz,et al. Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..
[26] Aleksandar Vakanski,et al. A secure architecture for IoT with supply chain risk management , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[27] Syed Hassan Ahmed,et al. NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks , 2018, The Journal of Supercomputing.
[28] Foutse Khomh,et al. Enforcing security in Internet of Things frameworks: A Systematic Literature Review , 2019, Internet Things.
[29] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[30] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[31] Shikha Agrawal,et al. Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.
[32] Mohammad Ali Jabraeil Jamali,et al. Towards the Internet of Things - Architectures, Security, and Applications , 2019 .
[33] Thomas Porter,et al. Chapter 7 – Active Security Monitoring , 2007 .
[34] Ju Ren,et al. Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing , 2017, IEEE Network.
[35] Mohsen Guizani,et al. Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.
[36] Jin Wei,et al. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.
[37] Rakesh Kumar Jha,et al. NB-IoT Security: A Survey , 2020, Wireless Personal Communications.
[38] Ali Dehghantanha,et al. Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[39] Muhammad Shafique,et al. Intelligent Security Measures for Smart Cyber Physical Systems , 2018, 2018 21st Euromicro Conference on Digital System Design (DSD).
[40] Yan Zhang,et al. Deep Learning for Secure Mobile Edge Computing , 2017, ArXiv.
[41] Tommaso Melodia,et al. Machine Learning for Wireless Communications in the Internet of Things: A Comprehensive Survey , 2019, Ad Hoc Networks.
[42] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[43] Neelam Sharma,et al. INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .
[44] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[45] Farhan Ullah,et al. IoT-based green city architecture using secured and sustainable android services , 2020 .
[46] Wenchang Shi,et al. A survey on internet of things security from data perspectives , 2019, Comput. Networks.
[47] Praveen Kumar Reddy Maddikunta,et al. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture , 2020, Comput. Commun..
[48] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[49] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[50] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[51] Azizol Abdullah,et al. Open Issues and Security Challenges of Data Communication Channels in Distributed Internet of Things (IoT): A Survey , 2018 .
[52] Shichao Zhang,et al. Efficient kNN classification algorithm for big data , 2016, Neurocomputing.
[53] Vijay Sivaraman,et al. Characterizing and classifying IoT traffic in smart cities and campuses , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[54] Kathleen Goeschel,et al. Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis , 2016, SoutheastCon 2016.
[55] Ranjan Kumar Behera,et al. Supervised link prediction using structured‐based feature extraction in social network , 2020, Concurr. Comput. Pract. Exp..
[56] Lan Wang,et al. Securing wireless implantable devices for healthcare: Ideas and challenges , 2009, IEEE Communications Magazine.
[57] Rajesh Kumar,et al. Fog computing: from architecture to edge computing and big data processing , 2018, The Journal of Supercomputing.
[58] Ali A. Ghorbani,et al. Botnet detection based on traffic behavior analysis and flow intervals , 2013, Comput. Secur..
[59] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[60] Arshdeep Bahga,et al. Blockchain Platform for Industrial Internet of Things , 2016 .
[61] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[62] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.
[63] Georgia Sakellari,et al. Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.
[64] Michael I. Jordan,et al. Machine learning: Trends, perspectives, and prospects , 2015, Science.
[65] Concha Bielza,et al. A Comparison of Graphical Techniques for Asymmetric Decision Problems , 1999 .
[66] Xue-wen Chen,et al. Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.
[67] Nadra Guizani,et al. A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks , 2020, IEEE Journal on Selected Areas in Communications.
[68] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[69] Biplab Sikdar,et al. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.
[70] Shilpa Chaudhari,et al. An efficient approach for enhancing security in Internet of Things using the optimum authentication key , 2020, International Journal of Computers and Applications.
[71] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[72] Akshi Kumar,et al. Machine Learning from Theory to Algorithms: An Overview , 2018, Journal of Physics: Conference Series.
[73] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[74] Song Guo,et al. The Web of Things: A Survey (Invited Paper) , 2011, J. Commun..
[75] Amr M. Youssef,et al. Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.
[76] Srinivasan Seshan,et al. Improving wireless privacy with an identifier-free link layer protocol , 2008, MobiSys '08.
[77] Soma Bandyopadhyay,et al. Role Of Middleware For Internet Of Things: A Study , 2011 .
[78] Kiran Ahuja,et al. Sustainable future IoT services with touch-enabled handheld devices , 2019 .
[79] Manas Ranjan Patra,et al. Network intrusion detection system: A machine learning approach , 2011, Intell. Decis. Technol..
[80] Guy W. Mineau,et al. A simple KNN algorithm for text categorization , 2001, Proceedings 2001 IEEE International Conference on Data Mining.
[81] Mohamed Amine Ferrag,et al. Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security , 2019, Sensors.
[82] Meng Zhang,et al. Recent Advances in Convolutional Neural Network Acceleration , 2018, Neurocomputing.
[83] Yang Xin,et al. Robust detection for network intrusion of industrial IoT based on multi-CNN fusion , 2020 .
[84] Axel Legay,et al. On the Performance of Convolutional Neural Networks for Side-Channel Analysis , 2018, SPACE.
[85] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[86] Anand Nayyar,et al. Cyber Security Challenges for Smart Cities , 2019, Practice, Progress, and Proficiency in Sustainability.
[87] Mohamed Amine Ferrag,et al. DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids , 2020, IEEE Transactions on Engineering Management.
[88] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[89] Amit Jain,et al. Machine Learning and Its Applicability in Networking , 2020 .
[90] Ying Zhang,et al. Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network , 2019, IEEE Access.
[91] Mohammad Hammoudeh,et al. Defence for Distributed Denial of Service Attacks in Cloud Computing , 2015 .
[92] Longzhi Yang,et al. Privacy and Security Aspects of E-Government in Smart Cities , 2019, Smart Cities Cybersecurity and Privacy.
[93] Wei Wei,et al. A survey of edge computing-based designs for IoT security , 2020, Digit. Commun. Networks.
[94] Sotiris B. Kotsiantis,et al. Machine learning: a review of classification and combining techniques , 2006, Artificial Intelligence Review.