  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/3055</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Systematic Analysis of threats, Machine Learning solutions and Challenges for Securing IoT environment</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of Computer Science &amp; Applications, Maharshi Dayanand University, Rohtak, Haryana, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Piyush</given_name>
    <surname>Piyush</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science, Indian Institute of Technology, Patna, Orchid- 0000-0001-5959-3136, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Deepak Dasaratha</given_name>
    <surname>Rao</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Asst. Professor, Dept. of IT, Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, TN, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Yasaswini</given_name>
    <surname>Mandiga</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science &amp; Applications, Maharshi Dayanand University, Rohtak, Haryana, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Nasib Singh</given_name>
    <surname>Gill</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science &amp; Applications, Maharshi Dayanand University, Rohtak, Haryana, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Preeti</given_name>
    <surname>Gulia</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Professor and Head Department of AIML and IPR Cell Nitte Meenakshi Institute of Technology Bengaluru, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Piyush Kumar</given_name>
    <surname>Pareek</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>The Internet of Things (IoT) has revolutionized our daily lives, impacting everything from healthcare to transportation and even home automation and industrial control systems. However, as the number of connected devices continues to rise, so do the security risks. In this review, we explore the different types of attacks that target various layers of IoT infrastructure. To counter these threats, researchers have proposed using machine learning (ML) and deep learning (DL) techniques for detecting different types of attacks. However, our examination of existing literature reveals that the effectiveness of these techniques can vary greatly depending on factors like the dataset used, the features considered, and the evaluation methods employed. Finally, we delve into the current challenges facing Intrusion Detection Systems (IDS) in their mission to protect IoT environments from evolving threats.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>367</first_page>
   <last_page>382</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.140227</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/3055</resource>
  </doi_data>
 </journal_article>
</journal>
