IoT Security: Threat Detection, Analysis, and Defense
Conflicts of Interest
References
- Lazea, D.; Hangan, A.; Cioara, T. Building Equi-Width Histograms on Homomorphically Encrypted Data. Future Internet 2025, 17, 256. [Google Scholar] [CrossRef]
- Fatema, K.; Dey, S.K.; Anannya, M.; Khan, R.T.; Rashid, M.M.; Su, C.; Mazumder, R. Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP. Future Internet 2025, 17, 234. [Google Scholar] [CrossRef]
- Cibrario Bertolotti, I.; Durante, L.; Cambiaso, E. Analyzing Impact and Systemwide Effects of the SlowROS Attack in an Industrial Automation Scenario. Future Internet 2025, 17, 167. [Google Scholar] [CrossRef]
- Althunayyan, M.; Javed, A.; Rana, O.; Spyridopoulos, T. Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks. Future Internet 2024, 16, 451. [Google Scholar] [CrossRef]
- Tseng, S.-M.; Wang, Y.-Q.; Wang, Y.-C. Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset. Future Internet 2024, 16, 284. [Google Scholar] [CrossRef]
- Javed, A.; Ehtsham, A.; Jawad, M.; Awais, M.N.; Qureshi, A.-u.-H.; Larijani, H. Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes. Future Internet 2024, 16, 200. [Google Scholar] [CrossRef]
- He, P.; Zhou, Y.; Qin, X. A Survey on Energy-Aware Security Mechanisms for the Internet of Things. Future Internet 2024, 16, 128. [Google Scholar] [CrossRef]
- Bagheri, N.; Bendavid, Y.; Safkhani, M.; Rostampour, S. Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol. Future Internet 2024, 16, 9. [Google Scholar] [CrossRef]
- Zhou, W.; Shen, S.; Liu, P. IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit. Future Internet 2025, 17, 19. [Google Scholar] [CrossRef]
- Papadopoulos, C.; Kollias, K.-F.; Fragulis, G.F. Recent Advancements in Federated Learning: State of the Art, Fundamentals, Principles, IoT Applications and Future Trends. Future Internet 2024, 16, 415. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Markowitch, O.; Dricot, J.-M. IoT Security: Threat Detection, Analysis, and Defense. Future Internet 2025, 17, 399. https://doi.org/10.3390/fi17090399
Markowitch O, Dricot J-M. IoT Security: Threat Detection, Analysis, and Defense. Future Internet. 2025; 17(9):399. https://doi.org/10.3390/fi17090399
Chicago/Turabian StyleMarkowitch, Olivier, and Jean-Michel Dricot. 2025. "IoT Security: Threat Detection, Analysis, and Defense" Future Internet 17, no. 9: 399. https://doi.org/10.3390/fi17090399
APA StyleMarkowitch, O., & Dricot, J.-M. (2025). IoT Security: Threat Detection, Analysis, and Defense. Future Internet, 17(9), 399. https://doi.org/10.3390/fi17090399