2017 27th International Telecommunication Networks and Applications Conference (ITNAC) 2017
DOI: 10.1109/atnac.2017.8215388
|View full text |Cite
|
Sign up to set email alerts
|

A smart city cyber security platform for narrowband networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 14 publications
0
19
0
Order By: Relevance
“…• Cyber attacks are considered as one of the biggest threats to IoT applications [199], and mostly the network and the application layers are the focus of the attackers [199].…”
Section: Lessons Learnt and Pitfallsmentioning
confidence: 99%
See 1 more Smart Citation
“…• Cyber attacks are considered as one of the biggest threats to IoT applications [199], and mostly the network and the application layers are the focus of the attackers [199].…”
Section: Lessons Learnt and Pitfallsmentioning
confidence: 99%
“…Whenever we talk about cryptographic security, key management is an associated challenge, and it is always considered to be an open research issue [200]. After, device, data, and network security, application layer security is also very essential as mostly the network and the application layers are the focus of the attackers [199]. Therefore, [89,154] highlight threats to IoT systems that rely on websites and application for service delivery, and also propose security measures.…”
Section: Lessons Learnt and Pitfallsmentioning
confidence: 99%
“…Many aspects and components of a smart city for upgrading the standard of the people are described in [4]. Authors in [5] suggest a platform design to secure a smart city facing cyber attackers. The structure is giving a warning DL model to identify attackers based on the user's data performance.…”
Section: Related Workmentioning
confidence: 99%
“…The results showed the ability of deep belief networks to detect the attacks effectively. In [19], a deep restricted Boltzmann machines model was combined with threshold detector for distributed Denial of service attack detection. Applying the deep component for extracting high level features from the raw dataset records contributes to the efficiency of discriminating between normal and attack traffic.…”
Section: Related Workmentioning
confidence: 99%