Skip to main content

Research Repository

Advanced Search

All Outputs (5)

Resource efficient federated deep learning for IoT security monitoring. (2022)
Conference Proceeding
ZAKARIYYA, I., KALUTARAGE, H. and AL-KADRI, M.O. 2022. Resource efficient federated deep learning for IoT security monitoring. In Li, W., Furnell, S. and Meng, W. (eds.) Attacks and defenses for the Internet-of-Things: revised selected papers from the 5th International workshop on Attacks and defenses for Internet-of-Things 2022 (ADIoT 2022), in conjunction with 27th European symposium on research in computer security 2022 (ESORICS 2022) 29-30 Septempber 2022, Copenhagen, Denmark. Lecture notes in computer science (LNCS), 13745. Cham: Springer [online], pages 122-142. Available from: https://doi.org/10.1007/978-3-031-21311-3_6

Federated Learning (FL) uses a distributed Machine Learning (ML) concept to build a global model using multiple local models trained on distributed edge devices. A disadvantage of the FL paradigm is the requirement of many communication rounds before... Read More about Resource efficient federated deep learning for IoT security monitoring..

Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks. (2022)
Conference Proceeding
ZAKARIYYA, I., KALUTARAGE, H. and AL-KADRI, M.O. 2022. Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks. In CPPS '22: proceedings of the 8th ACM (Association for Computing Machinery) Cyber-physical system security workshop 2022 (CPSS '22), co-located with the 17th ACM (Association for Computing Machinery) Asia conference on computer and communications security 2022 (ASIACCS '22) Nagasaki, Japan (virtual event). New York: ACM [online], pages 41-51. Available from: https://doi.org/10.1145/3494107.3522772

Internet of Things (IoT) devices are becoming increasingly popular and an integral part of our everyday lives, making them a lucrative target for attackers. These devices require suitable security mechanisms that enable robust and effective detection... Read More about Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks..

Memory efficient federated deep learning for intrusion detection in IoT networks. (2021)
Conference Proceeding
ZAKARIYYA, A. KALUTARAGE, H. and AL-KADRI, M.O. 2021. Memory efficient federated deep learning for intrusion detection in IoT networks. In Sani, S. and Kalutarage, H. (eds.) AI and cybersecurity 2021: proceedings of the 2021 Workshop on AI and cybersecurity (AI-Cybersec 2021), co-located with the 41st Specialist Group on Artificial Intelligence international conference on artificial intelligence (SGAI 2021), 14 December 2021, [virtual event]. CEUR workshop proceedings, 3125. Aachen: CEUR-WS [online], pages 85-99. Available from: http://ceur-ws.org/Vol-3125/paper7.pdf

Deep Neural Networks (DNNs) methods are widely proposed for cyber security monitoring. However, training DNNs requires a lot of computational resources. This restricts direct deployment of DNNs to resource-constrained environments like the Internet o... Read More about Memory efficient federated deep learning for intrusion detection in IoT networks..

Resource efficient boosting method for IoT security monitoring. (2021)
Conference Proceeding
ZAKARIYYA, I., AL-KADRI, M.O. and KALUTARAGE, H. 2021. Resource efficient boosting method for IoT security monitoring. In Proceedings of 18th Institute of Electrical and Electronics Engineers (IEEE) Consumer communications and networking conference 2021 (CCNC 2021), 9-12 January 2021, [virtual conference]. Piscataway: IEEE [online], article 9369620. Available from: https://doi.org/10.1109/ccnc49032.2021.9369620

Machine learning (ML) methods are widely proposed for security monitoring of Internet of Things (IoT). However, these methods can be computationally expensive for resource constraint IoT devices. This paper proposes an optimized resource efficient ML... Read More about Resource efficient boosting method for IoT security monitoring..

Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. (2019)
Conference Proceeding
ZAKARIYYA, I., AL-KADRI, M.O., KALUTARGE, H. and PETROVSKI, A. 2019. Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. In Obaidat, M. and Samarati, P. (eds.) Proceedings of the 16th International security and cryptography conference (SECRYPT 2019), co-located with the 16th International joint conference on e-business and telecommunications (ICETE 2019), 26-28 July 2019, Prague, Czech Republic. Setúbal, Portugal: SciTePress [online], 2, pages 523-528. Available from: https://doi.org/10.5220/0008119205230528.

Using Machine Learning (ML) for Internet of Things (IoT) security monitoring is a challenge. This is due to their resource constraint nature that limits the deployment of resource-hungry monitoring algorithms. Therefore, the aim of this paper is to i... Read More about Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm..