2021
DOI: 10.1016/j.cosrev.2021.100389
|View full text |Cite
|
Sign up to set email alerts
|

A systematic review on Deep Learning approaches for IoT security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0
5

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 75 publications
(52 citation statements)
references
References 97 publications
0
47
0
5
Order By: Relevance
“…These models learn the discriminating features of benign traffic and malicious traffic using different architectures such as Random Forest (RF) [ 18 ], Support Vector Machine (SVM) [ 19 ], Deep Neural Network (DNN) [ 20 ], Recurrent Neural Network (RNN) [ 21 ], Long Short-Term Memory (LSTM) [ 22 ] and Gated Recurrent Unit (GRU) [ 23 ]. For an in-depth understanding, comprehensive reviews and surveys on the application of ML and DL in intrusion detection are presented in [ 24 , 25 , 26 , 27 , 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…These models learn the discriminating features of benign traffic and malicious traffic using different architectures such as Random Forest (RF) [ 18 ], Support Vector Machine (SVM) [ 19 ], Deep Neural Network (DNN) [ 20 ], Recurrent Neural Network (RNN) [ 21 ], Long Short-Term Memory (LSTM) [ 22 ] and Gated Recurrent Unit (GRU) [ 23 ]. For an in-depth understanding, comprehensive reviews and surveys on the application of ML and DL in intrusion detection are presented in [ 24 , 25 , 26 , 27 , 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…The work in [59] analyzed the research landscape about Deep Learning (DL) approaches applied to IoT security. The study is based on three main research questions, namely, the security aspects involved, the used DL network architectures and the engaged datasets.…”
Section: Literature Surveymentioning
confidence: 99%
“…More so, Alsoufi et al [33] also investigated the application of Deep Learning in IoT Intrusion Detection Systems based on anomaly detection. L. Aversano et al [34] carried out a systematic review of how DL has been applied to security in IoT. Their review only concentrates on the security aspect of IoT QoS, leaving out the resource allocation and management aspects.…”
Section: Related Previous Review Papersmentioning
confidence: 99%