2023
DOI: 10.1007/978-3-031-28150-1_6
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Intrusion Detection Algorithm Based on Multi-Attack for Edge-Assisted Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 33 publications
0
1
0
Order By: Relevance
“…Although regulation of vulnerability disclosure behavior among hackers has been studied for many years, the emergence of new technologies and service models necessitates the collective participation of multiple stakeholders such as enterprises and service companies in collaborative disclosure. Especially, With the increasing prominence of security issues in fields of industry, healthcare, and the Internet of Things (IoT) [27][28][29][30], hackers exploiting vulnerabilities in artificial intelligence [31], blockchain [32], and intrusion detection systems [33] to launch large-scale targeted attacks have become norm. The demand for efficient data analysis and processing [34,35], network security protection [27], and privacy data protection [32] is steadily increasing for enterprises.…”
Section: Security Crowd-testingmentioning
confidence: 99%
“…Although regulation of vulnerability disclosure behavior among hackers has been studied for many years, the emergence of new technologies and service models necessitates the collective participation of multiple stakeholders such as enterprises and service companies in collaborative disclosure. Especially, With the increasing prominence of security issues in fields of industry, healthcare, and the Internet of Things (IoT) [27][28][29][30], hackers exploiting vulnerabilities in artificial intelligence [31], blockchain [32], and intrusion detection systems [33] to launch large-scale targeted attacks have become norm. The demand for efficient data analysis and processing [34,35], network security protection [27], and privacy data protection [32] is steadily increasing for enterprises.…”
Section: Security Crowd-testingmentioning
confidence: 99%
“…Smart city applications raise a serious of concerns and challenges in terms of security and privacy threats ranging from unauthorized intrusions, acknowledgements, disruption, mitigation, scrutiny and devastation 4 . Internet of Things also raises security concerns comprising of data identification, data authentication, data integrity, availability, confidentiality, access privileges, data privacy and trust 5 . The information transmitted between the IoT devices happens through a wide open communication channel they are highly prone to security and privacy attacks 6 .…”
Section: Introductionmentioning
confidence: 99%
“…Every device, from a simple sensor on a production line to a complex robotic arm, continuously sends and receives data. While this data-driven approach facilitates informed decision-making and predictive maintenance, it also introduces multiple points of vulnerability [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…The integrity and authenticity of data in smart manufacturing systems are of paramount importance. A single piece of compromised data can not only disrupt production but also lead to significant financial losses and safety concerns [5,12]. Despite the recognized importance of this issue, there remains a gap in the development and implementation of robust security mechanisms tailored to the unique challenges of smart manufacturing.…”
Section: Introductionmentioning
confidence: 99%