2021
DOI: 10.1007/978-3-030-90708-2_4
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Activity Detection in IoT Networks: A Nature-Inspired Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…IoT's widespread use poses a variety of problems. Data theft and network disruption are possible outcomes of cyberattacks using these vulnerabilities 8,9 . IoT now integrates wireless sensor technologies into a variety of sectors and use cases.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…IoT's widespread use poses a variety of problems. Data theft and network disruption are possible outcomes of cyberattacks using these vulnerabilities 8,9 . IoT now integrates wireless sensor technologies into a variety of sectors and use cases.…”
Section: Introductionmentioning
confidence: 99%
“…Data theft and network disruption are possible outcomes of cyberattacks using these vulnerabilities. 8,9 IoT now integrates wireless sensor technologies into a variety of sectors and use cases. Moreover, IoT extends beyond smart consumer devices by introducing wireless embedded systems in crucial structures, including, among others, health and care services, industrial sensor networks, and municipal infrastructures.…”
Section: Introductionmentioning
confidence: 99%