47748  | 0.877 | Ghaffari A.; Jelodari N.; pouralish S.; derakhshanfard N.; Arasteh B. | Securing Internet Of Things Using Machine And Deep Learning Methods: A Survey | Cluster Computing, 27, 7 (2024) |
34139  | 0.874 | Selvam R.; Velliangiri S. | Iotsdl: Internet Of Things Security For Deep Learning Techniques-A Research Perspectives | 2023 International Conference on Computer Communication and Informatics, ICCCI 2023 (2023) |
35256  | 0.874 | Rana M.; Mamun Q.; Islam R. | Lightweight Cryptography In Iot Networks: A Survey | Future Generation Computer Systems, 129 (2022) |
23845  | 0.864 | Mishra K.; Dutta T. | Enhancing Iot Security Through Deep Learning: A Comprehensive Study | Lecture Notes in Electrical Engineering, 1194 (2024) |
23732  | 0.863 | dos Santos F.C.; Duarte-Figueiredo F.; De Grande R.E.; dos Santos A.L. | Enhancing A Fog-Oriented Iot Authentication And Encryption Platform Through Deep Learning-Based Attack Detection | Internet of Things (Netherlands), 27 (2024) |
33773  | 0.863 | Iqbal A.; Aman M.N.; Sikdar B. | Iot Device Authentication Via Ram Trace Analysis: A Representation Learning Framework | Proceedings - IEEE Global Communications Conference, GLOBECOM (2024) |
16774  | 0.861 | Bairwa A.; Soni V.; Hemrajani P.; Kushwaha S.S.; Bohra M.K. | Cryptographic Hash Functions And Attack Complexity Analysis | Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (2022) |
30732  | 0.859 | Amine M.S.; Nada F.A.; Hosny K.M. | Improved Model For Intrusion Detection In The Internet Of Things | Scientific Reports, 15, 1 (2025) |
32899  | 0.858 | Sarker I.H.; Khan A.I.; Abushark Y.B.; Alsolami F. | Internet Of Things (Iot) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions And Research Directions | Mobile Networks and Applications, 28, 1 (2023) |
5489  | 0.857 | Sarker K.U. | A Systematic Review On Lightweight Security Algorithms For A Sustainable Iot Infrastructure | Discover Internet of Things, 5, 1 (2025) |