Search
Now showing items 11-20 of 22
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
(
IEEE Computer Society
, 2021 , Article)
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ...
IoT root union: A decentralized name resolving system for IoT based on blockchain
(
Elsevier Ltd
, 2021 , Article)
A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ...
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense
(
IEEE Computer Society
, 2021 , Other)
5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ...
A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
With the widespread use of online social networks, billions of pieces of information are generated every day. How to detect new topics quickly and accurately at such data scale plays a vital role in information recommendation ...
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ...
A method of chained recommendation for charging piles in internet of vehicles
(
Springer
, 2021 , Article)
With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing ...
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
(
Elsevier B.V.
, 2020 , Article)
Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber ...
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
(
IEEE Computer Society
, 2020 , Article)
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ...