2022
DOI: 10.1109/access.2022.3226879
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Tunicate Swarm Algorithm With Hybrid Deep Learning Enabled Attack Detection for Secure IoT Environment

Abstract: The Internet of Things (IoT) paradigm has matured and expanded rapidly across many disciplines. Despite these advancements, IoT networks continue to face an increasing security threat as a result of the constant and rapid changes in the network environment. In order to address these vulnerabilities, the Fog system is equipped with a robust environment that provides additional tools to beef up data security. However, numerous attacks are persistently evolving in IoT and fog environments as a result of the devel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 35 publications
(42 reference statements)
0
1
0
Order By: Relevance
“…Second, they must continue looking for their greatest search agent. Finally, they need to keep close to the agent [20]. The swarm knowledge of the additional tunicates in a www.ijacsa.thesai.org statistical framework is employed for updating their locations relative to the ideal solution.…”
Section: Tunicate Swarm Optimizationmentioning
confidence: 99%
“…Second, they must continue looking for their greatest search agent. Finally, they need to keep close to the agent [20]. The swarm knowledge of the additional tunicates in a www.ijacsa.thesai.org statistical framework is employed for updating their locations relative to the ideal solution.…”
Section: Tunicate Swarm Optimizationmentioning
confidence: 99%
“…Therefore, APK files need to be opened to extract the required data from the app's files. In our experiments, AAPT2 is used to access application-specific files [50]. As an attribute, applications' access to the AndroidManifest.xml file reveals which permissions they require.…”
Section: Feature Extractionmentioning
confidence: 99%