With advancements in engineering and science, the application of smart systems is increasing, generating a faster growth of the IoT network traffic. The limitations due to IoT restricted power and computing devices also raise concerns about security vulnerabilities. Machine learning-based techniques have recently gained credibility in a successful application for the detection of network anomalies, including IoT networks. However, machine learning techniques cannot work without representative data. Given the scarcity of IoT datasets, the DAD emerged as an instrument for knowing the behavior of dedicated IoT-MQTT networks. This paper aims to validate the DAD dataset by applying Logistic Regression, Naive Bayes, Random Forest, AdaBoost, and S...
Artigo publicado em: Proceedings of the 19th International Conference on Security and Cryptography -...
Nowadays the significant concern in IoT infrastructure is anomaly and attack detection from IoT devi...
Nowadays the significant concern in IoT infrastructure is anomaly and attack detection from IoT devi...
[Abstract] The relative simplicity of IoT networks extends service vulnerabilities and possibilitie...
With the rapid growth of the Internet of Things (IoT) applications in smart regions/cities, for exam...
With the rapid growth of the Internet of Things (IoT) applications in smart regions/cities, for exam...
Anomaly detection is an imperative problem in the field of the Internet of Things (IoT). The anomali...
In recent years, there has been a lot of focus on anomaly detection. Technological advancements, suc...
In recent years, there has been a lot of focus on anomaly detection. Technological advancements, suc...
With the growth of the internet of things (IoT) smart objects, managing these objects becomes a very...
Internet of Things (IoT) systems produce large amounts of raw data in the form of log files. This ra...
Although desktops and laptops have historically composed the bulk of botnet nodes, Internet of Thing...
The Internet of Things (IoT) consists of a massive number of smart devices capable of data collectio...
In recent years, different variants of the botnet are targeting government, private organizations an...
In recent years, the Internet of Things (IoT) has grown up rapidly and tremendously. This growth has...
Artigo publicado em: Proceedings of the 19th International Conference on Security and Cryptography -...
Nowadays the significant concern in IoT infrastructure is anomaly and attack detection from IoT devi...
Nowadays the significant concern in IoT infrastructure is anomaly and attack detection from IoT devi...
[Abstract] The relative simplicity of IoT networks extends service vulnerabilities and possibilitie...
With the rapid growth of the Internet of Things (IoT) applications in smart regions/cities, for exam...
With the rapid growth of the Internet of Things (IoT) applications in smart regions/cities, for exam...
Anomaly detection is an imperative problem in the field of the Internet of Things (IoT). The anomali...
In recent years, there has been a lot of focus on anomaly detection. Technological advancements, suc...
In recent years, there has been a lot of focus on anomaly detection. Technological advancements, suc...
With the growth of the internet of things (IoT) smart objects, managing these objects becomes a very...
Internet of Things (IoT) systems produce large amounts of raw data in the form of log files. This ra...
Although desktops and laptops have historically composed the bulk of botnet nodes, Internet of Thing...
The Internet of Things (IoT) consists of a massive number of smart devices capable of data collectio...
In recent years, different variants of the botnet are targeting government, private organizations an...
In recent years, the Internet of Things (IoT) has grown up rapidly and tremendously. This growth has...
Artigo publicado em: Proceedings of the 19th International Conference on Security and Cryptography -...
Nowadays the significant concern in IoT infrastructure is anomaly and attack detection from IoT devi...
Nowadays the significant concern in IoT infrastructure is anomaly and attack detection from IoT devi...