[1] Global IoT and non-IoT connections 2010-2025,
https://www.statista.com/statistics/1101442/ iot-number-of-connected-devices-worldwide/, Accessed Jan. 12, 2023.
[2] Social engineering attacks on the internet of things - IEEE internet of things,
https://iot.ieee.org/ newsletter/september-2016/social-engineering-attacks-on-the-internet-of-things.html, 2016, Accessed Jan. 13, 2023.
[3] S. Ali, M.A. Khan, J. Ahmad, A.W. Malik, and A. ur Rehman, Detection and prevention of black hole attacks in IOT & WSN, Third Int. Conf. Fog Mobile Edge Comput.(FMEC), IEEE, 2018, pp. 217–226.
[4] M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, Deep recurrent neural network for iot intrusion detection system, Simul. Model. Pract. Theory 101 (2020), 102031.
[5] H. Alyasiri, J.A. Clark, A. Malik, and R. de Fr´ein, Grammatical evolution for detecting cyberattacks in internet of things environments, Int. Conf. Comput. Commun. Networks (ICCCN), IEEE, 2021, pp. 1–6.
[6] M.E. Aminanto and K. Kim, Detecting active attacks in wi-fi network by semi-supervised deep learning, Conf. Inf. Secur. Cryptography, 2017.
[7] L. Atzori, A. Iera, and G. Morabito, The internet of things: A survey, Comput. Networks 54 (2010), no. 15, 2787–2805.
[8] A. Azmoodeh, A. Dehghantanha, M. Conti, and Kim-Kwang R. Choo, Detecting crypto-ransomware in iot networks based on energy consumption footprint, J. Ambient Intell. Humaniz. Comput. 9 (2018), no. 4, 1141–1152.
[9] E. Bertino and N. Islam, Botnets and internet of things security, Computer (Long. Beach. Calif). 50 (2017), no. 2, 76–79.
[10] L. Bontemps, V.L. Cao, J. McDermott, and N.-A. Le-Khac, Collective anomaly detection based on long short-term memory recurrent neural networks, Int. Conf. Future Data Secur. Engin., 2016, pp. 141–152.
[11] P.B. Callahan and S.R. Kosaraju, A decomposition of multidimensional point sets with applications to k nearestneighbors and n-body potential fields, J. ACM 42 (1995), no. 1, 67–90.
[12] A.M. Chandrashekhar, S.T. Ahmed, and N. Rahul, Analysis of security threats to database storage systems, Int. J. Adv. Res. data Min. Cloud Comput. 3 (2015), no. 5.
[13] Y. Chen, Y. Li, D. Xu, and L. Xiao, DQN-based power control for iot transmission against jamming, IEEE 87th Vehicular Technol. Conf. (VTC Spring), 2018, pp. 1–5.
[14] M. Conti, N. Dragoni, and V. Lesyk, A survey of man in the middle attacks, IEEE Commun. Surv. Tutorials 18 (2016), no. 3, 2027–2051.
[15] E. De Coninck, M. Abdel-Nasser, S. Willocx, B. Peeters, P. Simoens, P. Demeester, and M. Van de Ginste, Distributed neural networks for internet of things: The big-little approach, Int. Internet Things Summit, 2015, pp. 484–492.
[16] D.E. Denning, An intrusion-detection model, IEEE Trans. Softw. Eng. (1987), no. 2, 222–232.
[17] E. Fix and J.L. Hodges, Discriminatory analysis, nonparametric discrimination: Consistency properties, Int. Statist. Rev. 57 (1989), no. 3, 238–247.
[18] K. Fukushima, Neocognitron: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position, Biol. Cybern. 36 (1980), no. 4, 193–202.
[19] I. Goodfellow, Y. Bengio, and A. Courville, Deep learning, MIT press, 2016.
[20] T. Guo, Z. Xu, X. Yao, H. Chen, K. Aberer, and K. Funaya, Robust online time series prediction with recurrent neural networks, IEEE Int. Conf. Data Sci. Adv. Analy. (DSAA), 2016, pp. 816–825.
[21] M. Hermans and B. Schrauwen, Training and analysing deep recurrent neural networks, Adv. Neural Inf. Process. Syst., vol. 26, 2013.
[22] A. Heuser and M. Zohner, Intelligent machine homicide, Int. Workshop Constructive Side-Channel Anal. Secure Design, Springer, 2012, pp. 249–264.
[23] H. Hindy, C. Tachtatzis, R. Atkinson, E. Bayne, and X. Bellekens, Mqtt-iot-ids2020: Mqtt internet of things intrusion detection dataset, 2020.
[24] I. Idrissi, M. Azizi, and O. Moussaoui, Iot security with deep learning-based intrusion detection systems: A systematic literature review, Fourth Int. Conf. Intell. Comput. Data Sci. (ICDS), 2020, pp. 1–10.
[25] A.M. Iliyasu and C. Fatichah, A quantum hybrid pso combined with fuzzy k-nn approach to feature selection and cell classification in cervical cancer detection, Sensors 17 (2017), no. 12, 2935.
[26] T. Reinbacher J. Diechmann, K. Heineke and D. Wee, The internet of things: How to capture the value of IoT, Tech. report, Technical Report, 2018.
[27] S.U. Jan, S. Ahmed, V. Shakhov, and I. Koo, Toward a lightweight intrusion detection system for the internet of things, IEEE Access 7 (2019), 42450–42471.
[28] G.W. Kibirige and C.s Sanga, A survey on detection of sinkhole attack in wireless sensor network, arXiv preprint arXiv:1505.01941 (2015).
[29] I. Kotenko, I. Saenko, and A. Branitskiy, Framework for mobile internet of things security monitoring based on big data processing and machine learning, IEEE Access 6 (2018), 72714–72723.
[30] L.I. Kuncheva, Combining pattern classifiers: Methods and algorithms, John Wiley & Sons, 2014. [31] Y. LeCun, Y. Bengio, and G. Hinton, Deep learning, Nature 521 (2015), no. 7553, 436–444.
[32] L. Lerman, G. Bontempi, and O. Markowitch, A machine learning approach against a masked AES, J. Cryptographic Engin. 5 (2015), no. 2, 123–139.
[33] S. Li and L. Da Xu, Securing the internet of things, Syngress, 2017.
[34] W. Li, P. Yi, Y. Wu, L. Pan, and J. Li, A new intrusion detection system based on KNN classification algorithm in wireless sensor network, J. Electric. Comput. Engin. 2014 (2014).
[35] G. Liu, H. Zhao, F. Fan, G. Liu, Q. Xu, and S. Nazir, An enhanced intrusion detection model based on improved kNN in WSNs, Sensors 22 (2022), no. 4, 1407.
[36] J. Liu and W. Sun, Smart attacks against intelligent wearables in people-centric internet of things, IEEE Commun. Mag. 54 (2016), no. 12, 44–49.
[37] H. Maghrebi, T. Portigliatti, and E. Prouff, Breaking cryptographic implementations using deep learning techniques, Int. Conf. Secur. Privacy Appl. Cryptography Engin., 2016, pp. 3–26.
[38] P. Malhotra, L. Vig, G. Shroff, and P. Agarwal, Long short term memory networks for anomaly detection in time series, ESANN., vol. 89, 2015, pp. 89–94.
[39] N. McLaughlin, J. Martinez del Rincon, B.B. Kang, A.W.A. Wahab, H.J. Lee, and H. Kim, Deep android malware detection, Proc. Seventh ACM Conf. Data Appl. Secur. Privacy, 2017, pp. 301–308.
[40] M. Nawir, A. Amir, N. Yaakob, and O.B. Lynn, Internet of things (IoT): Taxonomy of security attacks, 3rd Int. Conf. Electronic Design (ICED), IEEE, 2016, pp. 321–326.
[41] H.F. Nweke, Y.W. Teh, M.A. Al-garadi, and U.R. Alo, Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: State of the art and research challenges, Expert Syst. Appl. 105 (2018), 233–261.
[42] M. O’Neill and C. Ryan, Grammatical evolution, IEEE Trans. Evol. Comput. 5 (2001), no. 4, 349–358.
[43] R. Pascanu, C. Gulcehre, K. Cho, and Y. Bengio, How to construct deep recurrent neural networks, arXiv Prepr. arXiv1312.6026 (2013).
[44] D. Perez, M.A. Astor, D.P. Abreu, and E. Scalise, Intrusion detection in computer networks using hybrid machine learning techniques, XLIII Latin Amer. Comput. Conf.(CLEI), 2017, pp. 1–10.
[45] P. Pongle and G. Chavan, Real time intrusion and wormhole attack detection in internet of things, Int. J. Comput. Appl. 121 (2015), no. 9.
[46] Y. Qin, D. Song, H. Chen, W. Cheng, G. Jiang, and G. Cottrell, A dual-stage attention-based recurrent neural network for time series prediction, arXiv Prepr. arXiv1704.02971 (2017).
[47] R. Zaheer R. Khan, S.U. Khan and S. Khan, Future internet: the internet of things architecture, possible applications and key challenges, 10th Int. Conf. Front. Inf. Technol., 2012, pp. 257–260.
[48] B. Rajagopalan and U. Lall, A k-nearest-neighbor simulator for daily precipitation and other weather variables, Water Resources Res. 35 (1999), no. 10, 3089–3101.
[49] A. Rajan, J. Jithish, and S. Sankaran, Sybil attack in IOT: Modelling and defenses, Int. Conf. Adv. Comput. Commun. Inf.(ICACCI), IEEE, 2017, pp. 2323–2327.
[50] Syed Rizvi, Aaron Kurtz, Joshua Pfeffer, and Mohammad Rizvi, Securing the internet of things (IoT): A securitytaxonomy for IoT, 17th IEEE Int. Conf. Trust, Secur. Privacy Comput. Commun./12th IEEE Int. Conf. Big Data Sci. Engin. (TrustCom/BigDataSE), IEEE, 2018, pp. 163–168.
[51] D.E. Rumelhart, G.E. Hinton, and R.J. Williams, Learning representations by back-propagating errors, Nature 323 (1986), no. 6088, 533–536.
[52] C. Ryan, J.J. Collins, and M.O’N. Neill, Grammatical evolution: Evolving programs for an arbitrary language, Eur. Conf. Genetic Program., 1998, pp. 83–96.
[53] T. Saba, T. Sadad, A. Rehman, Z. Mehmood, and Q. Javaid, Intrusion detection system through advance machine learning for the internet of things networks, IT Profess. 23 (2021), no. 2, 58–64.
[54] S. Samonas and D. Coss, The CIA strikes back: Redefining confidentiality, integrity and availability in security, J. Inf. Syst. Secur. 10 (2014), no. 3.
[55] B. Sch¨olkopf, Z. Luo, and V. Vovk, Empirical inference: Festschrift in honor of Vladimir N. Vapnik, Springer Science & Business Media, 2013.
[56] D.T. Shipmon, J.M. Gurevitch, P.M. Piselli, and S.T. Edwards, Time series anomaly detection; detection of anomalous drops with limited features and sparse examples in noisy highly periodic data, arXiv Prepr. arXiv1708.03665 (2017).
[57] K. Sonar and H. Upadhyay, A survey: Ddos attack on internet of things, Int. J. Eng. Res. Dev. 10 (2014), no. 11, 58–63.
[58] S. Tong and D. Koller, Support vector machine active learning with applications to text classification, J. Mach.
Learn. Res. 2 (2001), no. Nov, 45–66
[59] A. Torkaman and M.A. Seyyedi, Analyzing iot reference architecture models, Int. J. Comput. Sci. Softw. Eng. 5 (2016), no. 8, 154.
[60] P. Torres, C. Catania, S. Garcia, and C.G. Garino, An analysis of recurrent neural networks for botnet detection behavior, IEEE Biennial Cong. Argentina (ARGENCON), 2016, pp. 1–6.
[61] S. Vashi, J. Ram, J. Modi, S. Verma, and C. Prakash, Internet of things (IoT): A vision, architectural elements, and security issues, Int. Conf. I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017, pp. 492–496.
[62] L. Xiao, X. Wan, X. Lu, Y. Zhang, and D. Wu, Iot security techniques based on machine learning: How do iot devices use AI to enhance security?, IEEE Signal Process. Mag. 35 (2018), no. 5, 41–49.
[63] L. Yang, C. Ding, M. Wu, and K. Wang, Robust detection of false data injection attacks for data aggregation in an internet of things-based environmental surveillance, Computer Networks 129 (2017), 410–428.
[64] I. Yaqoob, H. Alasmary, A. Alashaikh, E. Ahmed, H. Song, and J.J.P.C. Rodrigues, The rise of ransomware and emerging security challenges in the internet of things, Comput. Networks 129 (2017), 444–458.
[65] Y. Yang Y. Peng X. Wang Z. Yang, Y. Yue and W. Liu, Study and application on the architecture and key technologies for IOT, Int. Conf. Multimedia Technol., 2011, pp. 747–751.
[66] Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, On secure wireless communications for iot under eavesdropper collusion, IEEE Trans. Autom. Sci. Eng. 13 (2015), no. 3, 1281–1293.
[67] K. Zhao and L. Ge, A survey on the internet of things security, Ninth Int. Conf. Comput. Intell. Secur., 2013,pp. 663 667.
[68] L. Zhu and N. Laptev, Deep and confident prediction for time series at uber, IEEE Int. Conf. Data Min. Workshops (ICDMW), 2017, pp. 103–110.