Yzzogh et al., 2024 - Google Patents
A comprehensive overview of AI-driven behavioral analysis for security in Internet of ThingsYzzogh et al., 2024
View PDF- Document ID
- 2865522701566629400
- Author
- Yzzogh H
- Kandil H
- Benaboud H
- Publication year
- Publication venue
- The Art of Cyber Defense
External Links
Snippet
The rapid expansion of Internet of Things (IoT) devices has brought in unprecedented connectivity and convenience. However, this surge in interconnectivity has concurrently given rise to multifaceted cybersecurity challenges, necessitating innovative solutions to …
- 238000004458 analytical method 0 title abstract description 77
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zaman et al. | Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey | |
| Sarker et al. | Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions | |
| Ahmed et al. | A survey of network anomaly detection techniques | |
| Momand et al. | A systematic and comprehensive survey of recent advances in intrusion detection systems using machine learning: Deep learning, datasets, and attack taxonomy | |
| Alkali et al. | Study of various methods for reliable, efficient and Secured IoT using Artificial Intelligence | |
| Goyal et al. | Integrating AI with cyber security for smart industry 4.0 application | |
| Arora et al. | Evaluation of machine learning algorithms used on attacks detection in industrial control systems | |
| Mozaffari et al. | Learning based anomaly detection in critical cyber-physical systems | |
| Mahor et al. | ML techniques for attack and anomaly detection in internet of things networks | |
| Induru et al. | Adaptive cybersecurity monitoring via semantic stream processing and GNN-based trust scoring on IPv4 logs | |
| Adil et al. | NG-ICPS: Next generation Industrial-CPS, Security Threats in the era of Artificial Intelligence, Open challenges with future research directions | |
| Dehkordi et al. | Internet of Things (IoT) Intrusion Detection by Machine Learning (ML): A Review. | |
| Srinivasan et al. | Intrusion Detection and Prevention System (IDPS) Model for IIoT Environments Using Hybridized Framework | |
| Sharma et al. | Multi-attention DeepCRNN: an efficient and explainable intrusion detection framework for Internet of Medical Things environments | |
| Yzzogh et al. | A comprehensive overview of AI-driven behavioral analysis for security in Internet of Things | |
| Ponnusamy et al. | Investigation on iot intrusion detection in wireless environment | |
| Okolo | A Review of Machine and Deep Learning Approaches for Enhancing Cybersecurity and Privacy in the Internet of Devices | |
| Wahab et al. | The significance of artificial intelligence in cybersecurity | |
| Mondal et al. | Iot data security with machine learning blckchain: Risks and countermeasures | |
| Bamou et al. | Implementing and evaluating an intrusion detection system for denial of service attacks in IoT environments | |
| Aisha et al. | Enhancing Cloud Security with Machine Learning-Based Anomaly Detection | |
| Manavadaria et al. | Anomaly detection algorithms in cybersecurity | |
| Pavithra et al. | A Comprehensive IoT Security Framework Empowered by Machine Learning | |
| Narang et al. | A study on Cyber-attack detection in IoMT using Machine Learning Techniques | |
| El Baltaji | Anomaly Detection at the Edge implementing Machine Learning Techniques |