Open Access
Issue
ITM Web Conf.
Volume 80, 2025
2025 2nd International Conference on Advanced Computer Applications and Artificial Intelligence (ACAAI 2025)
Article Number 01027
Number of page(s) 9
Section Machine Learning & Deep Learning Algorithms
DOI https://doi.org/10.1051/itmconf/20258001027
Published online 16 December 2025
  1. H. Mouratidis, V. Diamantopoulou, A Security analysis method for industrial internet of things. IEEE Trans. Ind. Inform. 14, 4093-4100 (2018) [Google Scholar]
  2. D. Canavese, L. Mannella, L. Regano, C. Basile, Security at the edge for resource- limited IoT devices. Sensors 24, 590 (2024) [Google Scholar]
  3. V.A. Phan, J. Jerabek, L. Malina, Optimizing IoT attack detection in edge AI: A comparison of lightweight machine learning models and feature reduction techniques, in Availability, Reliability and Security. ARES 2025. Lecture Notes in Computer Science 15998, Springer, Cham (2025) [Google Scholar]
  4. M.S. Ahmad, S.M. Shah, A lightweight mini-batch federated learning approach for attack detection in IoT. Internet of Things 25, 101088 (2024) [Google Scholar]
  5. S. A.R. J. Katiravan, Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security. Sci Rep 15, 22369 (2025) [Google Scholar]
  6. H. Rhachi, Y. Balboul, A. Bouayad, Enhanced anomaly detection in IoT networks using deep autoencoders with feature selection techniques. Sensors 25, 3150 (2025) [Google Scholar]
  7. M. Aly, M.H. Behiry, Enhancing anomaly detection in IoT-driven factories using logistic boosting, random forest, and SVM: A comparative machine learning approach. Sci Rep 15, 23694 (2025) [Google Scholar]
  8. A. Punia, M. Tiwari, S.S. Verma, A machine learning-based efficient anomaly detection system for enhanced security in compromised and maligned IoT networks. Results in Eng. 25, 105562 (2025) [Google Scholar]
  9. R. Rajaan, L. Kumar, N. Choudhary, A. Sharma, M. Butwall, Anomaly detection in smart home IoT systems using machine learning approaches. Int. J. Eng. Bus. Manag. 9, 43-47 (2025) [Google Scholar]
  10. A.O.I. Elsayed, H. Ahmed, R. Alharith, et al., Machine learning for IoT security: Detecting and mitigating cyber anomalies. Int. J. Softw. Eng. Comput. Syst. 11, 59-69 (2025) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.