2021 2nd International Conference on Computational Methods in Science &Amp; Technology (ICCMST) 2021
DOI: 10.1109/iccmst54943.2021.00014
|Get access via publisher |Cite
|
Sign up to set email alerts

Internet of Things-Based Middleware Against Cyber-Attacks on Smart Homes using Software-Defined Networking and Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…In [17], an integrated DL methodology is proposed utilizing Hybrid Dual-Channel CNN (DCCNN) with Spider Monkey Optimizer (SMO) model namely DCCNN-SMO. Tawfik et al [18] developed a method by signifying middle-ware. ML technique has comprised in the middle-ware to deliver automatic defense besides cyber-attacks on IoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…In [17], an integrated DL methodology is proposed utilizing Hybrid Dual-Channel CNN (DCCNN) with Spider Monkey Optimizer (SMO) model namely DCCNN-SMO. Tawfik et al [18] developed a method by signifying middle-ware. ML technique has comprised in the middle-ware to deliver automatic defense besides cyber-attacks on IoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…Cyber security means the practice of protecting electronic methods, computers, mobile devices, servers, networks, and data in malicious assaults. It is otherwise called information technology security [5]. Such intrusions include domain of research control mechanism by monitoring a change of the document mechanism, accessing sensitive records, making unapproved logins, using malware, and heightening advantages that can change the network conditions.…”
Section: Introductionmentioning
confidence: 99%
“…The authors estimated that more than 26 billion IoT gadgets are connected to the Internet [4]. And there is a rise in the commercial value of IoT gadgets and safeguarding the network in the future becomes mandatory as billions of devices would be connected [5]. Fig.…”
Section: Introductionmentioning
confidence: 99%