Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences. [PDF]
T AH, Sriraman H.
europepmc +1 more source
A Data Rate Monitoring Approach for Cyberattack Detection in Digital Twin Communication. [PDF]
Rodrigues C +3 more
europepmc +1 more source
Three-Basis Loop-Back QKD: A Passive Architecture for Secure and Scalable Quantum Mobile Networks. [PDF]
Lizama-Pérez LA, Morales-Calvo P.
europepmc +1 more source
A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems. [PDF]
Singh G +3 more
europepmc +1 more source
Dataset of SCADA traffic captures from a medical waste incinerator with injected cyberattacks. [PDF]
Al-Duwairi B +3 more
europepmc +1 more source
CoAP_UAD: CoAP under attack dataset - A comprehensive dataset for CoAP-based IoT security research. [PDF]
Aveleira-Mata J +5 more
europepmc +1 more source
A hybrid XGBoost-SVM ensemble framework for robust cyber-attack detection in the internet of medical things (IoMT). [PDF]
Abdelhaq M +5 more
europepmc +1 more source
Security Audit of IoT Device Networks: A Reproducible Machine Learning Framework for Threat Detection and Performance Benchmarking. [PDF]
Shaikhanova A +5 more
europepmc +1 more source
MAN-IN-THE-MIDDLE ATTACKS AND INTERNET OF THINGS
Zoran Čekerevac +3 more
openaire +1 more source
Efficient detection of intrusions in TON-IoT dataset using hybrid feature selection approach. [PDF]
Dharini N, Janani VS, Katiravan J.
europepmc +1 more source

