In Internet of Things, the network devices have been more vulnerable to various intrusion attacks. Most of the existing algorithms are trained in a centralized manner, which may cause external ...
However, traditional security methods struggle to cope with these attacks due to the limited computational power of IoT devices and the dynamic nature of cyber threats. Anomaly-based intrusion ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results