2 code implementations • 17 Oct 2023 • Kahraman Kostas, Mike Just, Michael A. Lones
In this paper we present an approach for modelling IoT network attacks that focuses on generalizability, yet also leads to better detection and performance.
Explainable Artificial Intelligence (XAI) feature selection +1
1 code implementation • 27 Apr 2023 • Kahraman Kostas
While the use of the Internet of Things is becoming more and more popular, many security vulnerabilities are emerging with the large number of devices being introduced to the market.
1 code implementation • 27 Apr 2023 • Kahraman Kostas
While the use of the Internet of Things is becoming more and more popular, many security vulnerabilities are emerging with the large number of devices being introduced to the market.
1 code implementation • 15 Aug 2022 • Kahraman Kostas, Rabia Yasa Kostas, Francisco Zampella, Firas Alsehly
However, measuring the spatial distance between given set of WiFi fingerprints is heavily affected by the selection of the signal distance function used to model signal space as geospatial distance.
2 code implementations • IEEE Internet of Things Journal 2022 • Kahraman Kostas, Mike Just, Michael A. Lones
Device identification is one way to secure a network of IoT devices, whereby devices identified as suspicious can subsequently be isolated from a network.