
Int J Performability Eng ›› 2026, Vol. 22 ›› Issue (2): 67-76.doi: 10.23940/ijpe.26.02.p2.6776
• Original article • Previous Articles Next Articles
Vaishali N. Rane*, and Arunkumar M S
Submitted on
;
Revised on
;
Accepted on
Contact:
Vaishali N. Rane
About author:Vaishali N. Rane, and Arunkumar M S. Autoencoder-Guided ML for Real-Time IoT Anomaly Detection [J]. Int J Performability Eng, 2026, 22(2): 67-76.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
| [1] |
Ali H.A.S., and Rani J.V., 2024. Machine learning for internet of things (IoT) security: a comprehensive survey. Int. J. Comput. Netw. Appl.(IJCNA), 11(5), pp. 617-659.
|
| [2] |
Saumya Y.M., and Vinay P., 2024. SmartDefend-IoT security using machine learning. In 2024 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), pp. 109-114.
|
| [3] |
Omarov B.S., Auelbekov O.А., Kulambayev B.O., and Omarov B.S., 2024. IoT network intrusion detection using machine learning on unsw-nb15 dataset. HERALD of the Kazakh-British Technical University Учредители: Казахстанско-британский технический университет, 21(3), pp. 48-57.
|
| [4] |
Htwe C.S., Myint Z.T.T., and Thant Y.M., 2024. IoT security using machine learning methods with features correlation. Journal of Computing Theories and Applications, 2(2), pp. 151-163.
|
| [5] |
Harbi Y., Medani K., Gherbi C., Aliouat Z., and Harous S., 2024. Roadmap of adversarial machine learning in internet of things-enabled security systems. Sensors, 24(16), 5150.
|
| [6] |
Alomiri A., Mishra S., and AlShehri M., 2024. Machine learning-based security mechanism to detect and prevent cyber-attack in IoT networks. International Journal of Computing and Digital Systems, 16(1), pp. 645-659.
|
| [7] |
Ibitoye O.F., 2024. Robust Defenses Against Adversarial Machine Learning in Internet of Things Security(Doctoral dissertation, Carleton University).
|
| [8] |
Iqbal Z., Sajid A., Zakki M.N., Zafar A., and Mehmood A., 2024. Role of machine and deep learning algorithms in secure intrusion detection systems (IDS) for IoT & smart cities. International Journal of Information Technology, Research and Applications, 3(4), pp. 1-16.
|
| [9] |
Jony A.I., and Arnob A.K.B., 2024. Securing the internet of things: evaluating machine learning algorithms for detecting IoT cyberattacks using cic-iot2023 dataset. International Journal of Information Technology and Computer Science, 16(4), pp. 56-65.
|
| [10] |
Kumar A., Guleria K., Chauhan R., and Upadhyay D., 2024. Enhancing security in CIC IoT networks through machine learning algorithms. In 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS), pp. 1-5.
|
| [11] |
Wu X.W., Cao Y., and Dankwa R., 2024. Pareto-optimal machine learning models for security of IoT applications. In 2024 International Conference on Smart Applications, Communications and Networking (SmartNets), pp. 1-6.
|
| [12] |
El-Sofany H., El-Seoud S.A., Karam O.H., and Bouallegue B., 2024. Using machine learning algorithms to enhance IoT system security. Scientific Reports, 14(1), 12077.
|
| [13] |
Jones R.K., 2024. Enhancing IoT security: leveraging advanced deep learning architectures for proactive botnet detection and network resilience. In Redefining Security with Cyber AI, pp. 56-71.
|
| [14] |
Mohamed M., and Alosman K., 2024. A comprehensive machine learning framework for robust security management in cloud-based internet of things systems. Jurnal Kejuruteraan, 36(3), pp. 1055-1065.
|
| [15] |
Sai Y., and Wang T., 2024. IoT information security system based on artificial intelligence. In 2024 Second International Conference on Networks, Multimedia and Information Technology (NMITCON), pp. 1-6.
|
| [16] |
Rani S., Sharma A., and Zohaib M., 2024. Study for integrating IoT-IDS datasets: machine and deep learning for secure IoT network system. In Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, pp. 686-691.
|
| [17] |
Saini H., Mohammad F., Singh M.K., Sharma K.K., Shukla M., and Singh R., 2024. IoT and machine learning based real-time protection against cyber-physical threat mitigation. In 2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp. 1751-1755.
|
| [18] |
Şimşek M.M., and Atılgan E., 2024. DoS and DDoS attacks on internet of things and their detection by machine learning algorithms. Dicle ÜNiversitesi MüHendislik FaküLtesi MüHendislik Dergisi, 15(2), pp. 341-353.
|
| [19] |
Ioannou I., Savva M., Raspopoulos M., Christophorou C., and Vassiliou V., 2024. Revolutionising IoT network security by assessing ML localisation techniques against jamming attacks. In 2024 22nd Mediterranean Communication and Computer Networking Conference (MedComNet), pp. 1-10.
|
| [1] | Callistus Tochukwu Ikwuazom, Francisca Nonyelum Ogwueleka, Mohammed Baba Hammawa, and Rajesh Prasad. HEA-NIDS: A Hybrid-Ensemble Anomaly Detection System for Mitigating Network Intrusions and DDoS Precursors in Cloud Storage Environments [J]. Int J Performability Eng, 2026, 22(2): 77-87. |
| [2] | Bhupendra Ram, Suraj Malik, and Nidhi Bansal. IoT-Based Smart Parking: Comparative Analysis of Scheduling Approaches [J]. Int J Performability Eng, 2026, 22(1): 50-56. |
| [3] | Ankur Sisodia and Swati Vishnoi. ASEIP: Adaptive Secure Energy-Efficient IoT Protocol for Unified Terrestrial and Underwater IoT Environments [J]. Int J Performability Eng, 2025, 21(9): 521-528. |
| [4] | Rajesh Prasad, Gracy Gupta, Kanishka Agarwal, Malika Garg, and Mohd Asjad Raza Ansari. Real-Time Fault Detection in Industrial Machinery using Thermal Imaging and Machine Learning [J]. Int J Performability Eng, 2025, 21(9): 529-539. |
| [5] | Huthaifa Al-Khazraji, Mohammed Majid Msallam. A Two-Stage Model for Condition-Based Maintenance using Machine Learning Algorithms [J]. Int J Performability Eng, 2025, 21(8): 422-428. |
| [6] | Baljeet Singh. Enhancing Software Reliability in Industrial Mechatronics through Anomaly Detection Models [J]. Int J Performability Eng, 2025, 21(8): 429-437. |
| [7] | Vikas, Rajesh Prasad, Santosh Kumar Upadhyay, Amit Kumar. Zero Trust-Driven Anomaly Detection Framework for Wireless Sensor Networks [J]. Int J Performability Eng, 2025, 21(8): 463-471. |
| [8] | Sharma Ji and Abhishek Mishra. A Hybrid Deep Learning-Based IoT System Security Framework for 5G-Enabled Smart Cities [J]. Int J Performability Eng, 2025, 21(7): 361-371. |
| [9] | Sushant Kumar Singh. Emotion-Aware Music Recommendation System using Facial Expression Analysis [J]. Int J Performability Eng, 2025, 21(6): 326-331. |
| [10] | Sumit Badotra. Machine Learning Enabled Model Against DDoS Detection using Software Defined Networking [J]. Int J Performability Eng, 2025, 21(4): 219-225. |
| [11] | Ashu Mehta, Navdeep Kaur, and Amandeep Kaur. A Review of Software Fault Prediction Techniques in Class Imbalance Scenarios [J]. Int J Performability Eng, 2025, 21(3): 123-130. |
| [12] | Vikas, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Trust Management in WSN using ML for Detection of DDoS Attacks [J]. Int J Performability Eng, 2025, 21(3): 157-167. |
| [13] | Preety and Pushpendra Kumar Verma. Managing AI-Powered Cyber Threats, Adversarial Attacks, and Ensuring Ethical AI Alignment with Human Values [J]. Int J Performability Eng, 2025, 21(12): 673-685. |
| [14] | Ram Chatterjee, Mrinal Pandey, Hardeo Kumar Thakur, and Anand Gupta. Fortifying Fake Review Detection using Feature Engineered Revised Star Rating and Explainable AI [J]. Int J Performability Eng, 2025, 21(12): 697-704. |
| [15] | Puneet Chauhan and Shashiraj Teotia. Real-Time Behavioral Analysis for Ransomware Response: A Framework Leveraging Machine Learning and Threat Intelligence Feeds [J]. Int J Performability Eng, 2025, 21(11): 639-650. |
|
||