1. Arul E.Deep Nonlinear Regression Least Squares Polynomial Fit to Detect Malicious Attack on IoT Devices. Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 1, pp. 769-779, 2021. 2. Bhayo J., Hameed S., andShah S.A.An Efficient Counter-based DDoS Attack Detection Framework Leveraging Software Defined IoT (SD-IoT). IEEE Access, vol. 8, pp. 221612-221631, 2020. 3. Yin D., Zhang L., andYang K.A DDoS Attack Detection and Mitigation with Software-Defined Internet of Things Framework. IEEE Access, vol. 6, pp. 24694-24705, 2018. 4. Samy A., Yu H., andZhang H.Fog-based Attack Detection Framework for Internet of Things using Deep Learning. IEEE Access, vol. 8, pp. 74571-74585, 2020. 5. Vu L., Nguyen Q.U., Nguyen D.N., Hoang D.T., andDutkiewicz E.Deep Transfer Learning for IoT Attack Detection. IEEE Access, vol. 8, pp. 107335-107344, 2020. 6. Datta P., Tanwar S., Panda S.N., andRana A. Security and Issues of M-Banking: A Technical Report. In2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), IEEE, pp. 1115-1118, 2020. 7. Khan A.Y., Latif R., Latif S., Tahir S., Batool G., andSaba T.Malicious Insider Attack Detection in IoTs using Data Analytics. IEEE Access, vol. 8, pp. 11743-11753, 2019. 8. Jia Y., Zhong F., Alrawais A., Gong B., andCheng X.Flowguard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks. IEEE Internet of Things Journal, vol. 7, no. 10, pp. 9552-9562, 2020. 9. Tariq N., Asim M., Maamar Z., Farooqi M.Z., Faci N., andBaker T.A Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Sensor Node-Powered IoT. Journal of Parallel and Distributed Computing, vol. 134, pp. 198-206, 2019. 10. Yoon J.Deep-Learning Approach to Attack Handling of IoT Devices using IoT-Enabled Network Services. Internet of Things, vol. 11, pp. 100241, 2020. 11. Kaliyar P., Jaballah W.B., Conti M., andLal C.LiDL: Localization with Early Detection of Sybil and Wormhole Attacks in IoT Networks. Computers & Security, vol. 94, pp. 101849, 2020. 12. Mirsky Y., Golomb T., andElovici Y.Lightweight Collaborative Anomaly Detection for the IoT using Blockchain. Journal of Parallel and Distributed Computing, vol. 145, pp. 75-97, 2020. 13. Shafiq M., Tian Z., Sun Y., Du X., andGuizani M.Selection of Effective Machine Learning Algorithm and Bot-IoT Attacks Traffic Identification for Internet of Things in Smart City. Future Generation Computer Systems, vol. 107, pp. 433-442, 2020. 14. Zhi T., Liu Y., andWu J.A Reputation Value-based Early Detection Mechanism Against the Consumer-Provider Collusive Attack in Information-Centric IoT. IEEE Access, vol. 8, pp. 38262-38275, 2020. 15. Wang N., Li W., Alipour-Fanid, A., Dabaghchian, M., and Zeng, K. Compressed-Sensing-based Pilot Contamination Attack Detection for NOMA-IoT Communications. IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7764-7772, 2020. 16. Aboelwafa M.M., Seddik K.G., Eldefrawy M.H., Gadallah Y., andGidlund M.A Machine-Learning-based Technique for False Data Injection Attacks Detection in Industrial IoT. IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8462-8471, 2020. 17. Kakkar L., Gupta D., Saxena S., andTanwar S.An Analysis of Integration of Internet of Things and Cloud Computing. Journal of Computational and Theoretical Nanoscience, vol. 16, no. 10, pp. 4345-4349, 2019. 18. Bojarajulu B., Tanwar S., andRana A.A Synoptic Review on Feature Selection and Machine Learning Models used for Detecting Cyber Attacks in IoT. In 2021 IEEE 8th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), IEEE, pp. 1-7), 2021. 19. Kakkar L., Gupta D., Saxena S., andTanwar S.IoT Architectures and Its Security: A Review. In Proceedings of the Second International Conference on Information Management and Machine Intelligence, Springer, Singapore, pp. 87-94, 2021. 20. Sriram S., Vinayakumar R., Alazab M., andSoman, K.P. Network Flow based IoT Botnet Attack Detection using Deep Learning. In IEEE INFOCOM2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS), IEEE, pp. 189-194, 2020. 21. Shareena J., Ramdas A., andAP H.Intrusion Detection System for IoT Botnet Attacks using Deep Learning. SN Computer Science, vol. 2, 3, pp. 1-8, 2021. 22. Al Shorman, A., Faris, H., and Aljarah, I. Unsupervised Intelligent System based on One Class Support Vector Machine and Grey Wolf Optimization for IoT Botnet Detection. Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 7, pp. 2809-2825, 2020. 23. Asadi M.Detecting IoT Botnets based on the Combination of Cooperative Game Theory with Deep and Machine Learning Approaches. Journal of Ambient Intelligence and Humanized Computing, pp. 1-15, 2021. 24. Nguyen H.T., Ngo Q.D., andLe V.H.A Novel Graph-Based Approach for IoT Botnet Detection. International Journal of Information Security, vol. 19, no. 5, pp. 567-577, 2020. 25. Tong L., Ma H., Lin Q., He J., andPeng L.A Novel Deep Learning Bi-GRU-I Model for Real-Time Human Activity Recognition using Inertial Sensors. IEEE Sensors Journal, vol. 22, no. 6, pp. 6164-6174, 2022. 26. IoT Botnet Dataset. Available on: https://sites.google.com/view/iotbotnetdatset/home. Access in January 2022. |