[go: up one dir, main page]

Yzzogh et al., 2024 - Google Patents

A comprehensive overview of AI-driven behavioral analysis for security in Internet of Things

Yzzogh et al., 2024

View PDF
Document ID
2865522701566629400
Author
Yzzogh H
Kandil H
Benaboud H
Publication year
Publication venue
The Art of Cyber Defense

External Links

Snippet

The rapid expansion of Internet of Things (IoT) devices has brought in unprecedented connectivity and convenience. However, this surge in interconnectivity has concurrently given rise to multifaceted cybersecurity challenges, necessitating innovative solutions to …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Zaman et al. Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey
Sarker et al. Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions
Ahmed et al. A survey of network anomaly detection techniques
Momand et al. A systematic and comprehensive survey of recent advances in intrusion detection systems using machine learning: Deep learning, datasets, and attack taxonomy
Alkali et al. Study of various methods for reliable, efficient and Secured IoT using Artificial Intelligence
Goyal et al. Integrating AI with cyber security for smart industry 4.0 application
Arora et al. Evaluation of machine learning algorithms used on attacks detection in industrial control systems
Mozaffari et al. Learning based anomaly detection in critical cyber-physical systems
Mahor et al. ML techniques for attack and anomaly detection in internet of things networks
Induru et al. Adaptive cybersecurity monitoring via semantic stream processing and GNN-based trust scoring on IPv4 logs
Adil et al. NG-ICPS: Next generation Industrial-CPS, Security Threats in the era of Artificial Intelligence, Open challenges with future research directions
Dehkordi et al. Internet of Things (IoT) Intrusion Detection by Machine Learning (ML): A Review.
Srinivasan et al. Intrusion Detection and Prevention System (IDPS) Model for IIoT Environments Using Hybridized Framework
Sharma et al. Multi-attention DeepCRNN: an efficient and explainable intrusion detection framework for Internet of Medical Things environments
Yzzogh et al. A comprehensive overview of AI-driven behavioral analysis for security in Internet of Things
Ponnusamy et al. Investigation on iot intrusion detection in wireless environment
Okolo A Review of Machine and Deep Learning Approaches for Enhancing Cybersecurity and Privacy in the Internet of Devices
Wahab et al. The significance of artificial intelligence in cybersecurity
Mondal et al. Iot data security with machine learning blckchain: Risks and countermeasures
Bamou et al. Implementing and evaluating an intrusion detection system for denial of service attacks in IoT environments
Aisha et al. Enhancing Cloud Security with Machine Learning-Based Anomaly Detection
Manavadaria et al. Anomaly detection algorithms in cybersecurity
Pavithra et al. A Comprehensive IoT Security Framework Empowered by Machine Learning
Narang et al. A study on Cyber-attack detection in IoMT using Machine Learning Techniques
El Baltaji Anomaly Detection at the Edge implementing Machine Learning Techniques