2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies (BDCAT '21) 2021
DOI: 10.1145/3492324.3494170
|View full text |Cite
|
Sign up to set email alerts
|

Verification Based Scheme to Restrict IoT Attacks

Abstract: In recent years, with the increased usage of the Internet of Things (IoT) devices, cyber-attacks have become a serious threat over the Internet. These devices have low memory capacity and processing power, which makes them easy targets for attackers. The research community has proposed different approaches to deal with emerging variants of attacks on IoT devices using various machine learning techniques. However, these approaches rely heavily on the classifier's categorization of a given record while ignoring … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 33 publications
(26 reference statements)
0
1
0
Order By: Relevance
“…Conversely, despite these benefits, several challenges still need to be faced to enable efficient and secure operations (e.g., interoperability, security, standards, and server technologies) [24][25][26][27]. The development of new applications may also bring new requirements to the systems [28,29].…”
Section: Introductionmentioning
confidence: 99%
“…Conversely, despite these benefits, several challenges still need to be faced to enable efficient and secure operations (e.g., interoperability, security, standards, and server technologies) [24][25][26][27]. The development of new applications may also bring new requirements to the systems [28,29].…”
Section: Introductionmentioning
confidence: 99%