Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform Authors: M. Humayn Kabir, Khondokar Fida Hasan, Mohammad Kamrul Hasan, Keyvan Ansari | Published: 2021-10-31 IoT SecurityApplication of XAITransparency and Verification 2021.10.31 2025.05.28 Literature Database
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks Authors: Keval Doshi, Yasin Yilmaz, Suleyman Uludag | Published: 2020-06-15 DDoS AttackIoT SecurityIntrusion Detection System 2020.06.15 2025.05.28 Literature Database
Towards a secure behavior modeling for IoT networks using Blockchain Authors: Jawad Ali, Ahmad Shahrafidz Khalid, Eiad Yafi, Shahrulniza Musa, Waqas Ahmed | Published: 2020-01-06 IoT SecurityTrusted Capable Model EnvironmentsDeep Learning 2020.01.06 2025.05.28 Literature Database
RadIoT: Radio Communications Intrusion Detection for IoT – A Protocol Independent Approach Authors: Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre | Published: 2018-11-09 IoT SecuritySignal AnalysisAttack Evaluation 2018.11.09 2025.05.28 Literature Database
Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique | Published: 2018-11-05 IoT SecurityPoisoning AttackModel Extraction Attack 2018.11.05 2025.05.28 Literature Database
Identification of Wearable Devices with Bluetooth Authors: Hidayet Aksu, A. Selcuk Uluagac, Elizabeth S. Bentley | Published: 2018-09-27 IoT SecurityIoT Traffic CharacteristicsPerformance Evaluation Metrics 2018.09.27 2025.05.28 Literature Database
Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data Authors: Simon Duque Anton, Lia Ahrens, Daniel Fraunholz, Hans Dieter Schotten | Published: 2018-09-20 IoT SecurityIoT Traffic CharacteristicsAnomaly Detection Method 2018.09.20 2025.05.28 Literature Database
PUF-AES-PUF: a novel PUF architecture against non-invasive attacks Authors: Weize Yu, Jia Chen | Published: 2018-09-11 IoT SecurityRobustness Improvement MethodEncryption Method 2018.09.11 2025.05.28 Literature Database
IoTDots: A Digital Forensics Framework for Smart Environments Authors: Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac | Published: 2018-09-03 FR Detection MechanismIoT SecurityCrime Detection 2018.09.03 2025.05.28 Literature Database
Peek-a-Boo: I see your smart home activities, even encrypted! Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac | Published: 2018-08-08 | Updated: 2020-05-13 IoT SecurityTraffic Characteristic AnalysisMachine Learning Method 2018.08.08 2025.05.28 Literature Database