2018
DOI: 10.1109/msp.2018.2825478
|View full text |Cite
|
Sign up to set email alerts
|

IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
270
0
3

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 540 publications
(273 citation statements)
references
References 28 publications
0
270
0
3
Order By: Relevance
“…[30][31][32][33] Several well-known attacks have been described in the literature. A more extensive discussion of attacks on IoT devices is beyond the scope of this paper but can be found in the recent literature.…”
Section: Common Attacks On Iot Devicesmentioning
confidence: 99%
See 4 more Smart Citations
“…[30][31][32][33] Several well-known attacks have been described in the literature. A more extensive discussion of attacks on IoT devices is beyond the scope of this paper but can be found in the recent literature.…”
Section: Common Attacks On Iot Devicesmentioning
confidence: 99%
“…[30][31][32][33] Several well-known attacks have been described in the literature. 30,35 For example, an attacker may use a remote execution service's vulnerability on an IoT device in order to install a trojan that will provide him or her access to the device. 34 The first approach aims to overwhelm the lightweight communication channel that is utilized.…”
Section: Common Attacks On Iot Devicesmentioning
confidence: 99%
See 3 more Smart Citations