Skip to main content
. 2024 Sep 8;24(17):5834. doi: 10.3390/s24175834

Table 1.

Security challenges in IoT attack mitigation studies.

Ref. Approach Description Privacy
[33] CNN ResNet model Transformed network traffic data into images for DoS/DDoS detection No
[34] Radio-based RF jamming mitigation Utilized programmable beam-steering antennas for real-time jammer categorization No
[35] UNSW-NB15 data analysis Investigated flow, MQTT, and TCP feature clusters No
[36] Machine learning algorithms Evaluated nine ML algorithms for IoT malware identification No
[37] Simulation-based approach Generated artificial training data for SVM classifiers No