[1] Rajesh Rajaan, Baldev Singh, Nilam Choudhary “Advancements in IoT Anomaly Detection: Leveraging Machine Learning for Enhanced Security,” International Conference on Advancements in Computing Technologies and Artificial Intelligence (COMPUTATIA-2025), DOI:10.2991/978-94-6463-700-7_30
[2] M. Ahmed, A. N. Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19–31, Jan. 2016.
[3] Y. Meidan et al., “N-BaIoT: Network-based detection of IoT botnet attacks using deep autoencoders,” IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, Jul.–Sept. 2017.
[4] S. Marchal et al., “Off-the-hook: An efficient and usable client-side phishing prevention application,” IEEE Trans. Comput., vol. 68, no. 3, pp. 435–448, Mar. 2019.
[5] M. Shukla and R. Sinha, “Real-time anomaly detection in IoT-based smart home environment,” International Journal of Information Security Science, vol. 9, no. 2, pp. 90–100, 2020.
[6] S. Roy, A. Chowdhury, and S. Naskar, “Ensemble learning for IoT anomaly detection,” Procedia Computer Science, vol. 167, pp. 2497–2506, 2020.
[7] R. Kumar and P. Sharma, “LSTM-based anomaly detection for time series in smart home IoT,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 3259–3271, 2021.
[8] H. Yin et al., “Autoencoder-based anomaly detection for smart home networks,” Sensors, vol. 21, no. 3, pp. 1–15, 2021.
[9] L. Zhang and J. Xu, “Comparative analysis of supervised and unsupervised methods for IoT anomaly detection,” Future Internet, vol. 13, no. 2, pp. 1–16, 2021.
[10] X. Wang et al., “A CNN-based anomaly detection model for smart home IoT systems,” IEEE Internet of Things Journal, vol. 9, no. 4, pp. 2650–2660, 2022.
[11] P. Singh and A. K. Sinha, “Feature selection for improving anomaly detection accuracy in IoT systems,” Expert Systems with Applications, vol. 198, p. 116904, 2022.
[12] D. Yadav et al., “Federated learning for anomaly detection in decentralized smart home systems,” Journal of Network and Computer Applications, vol. 205, p. 103412, 2022.
[13] Z. Raza et al., “Adversarial attacks on machine learning-based IoT anomaly detection systems,” Computer Networks, vol. 208, p. 108845, 2022.
[14] Ali and M. Khan, “A hybrid approach using SVM and KNN for smart home anomaly detection,” Neural Computing and Applications, vol. 34, pp. 11203–11215, 2022.
[15] S. Sharma and R. Aggarwal, “Real-time anomaly detection for smart home traffic data using machine learning,” Sensors and Actuators A: Physical, vol. 345, p. 113740, 2023.
[16] Q. Tran et al., “Transfer learning-based IoT anomaly detection in smart homes,” IEEE Access, vol. 11, pp. 4231–4243, 2023.
[17] M. Nair and A. George, “Graph neural networks for smart home IoT anomaly detection,” IEEE Internet of Things Journal, vol. 10, no. 1, pp. 150–160, 2023.
[18] L. Zhao and H. Liu, “Adaptive anomaly detection using reinforcement learning in smart homes,” Information Sciences, vol. 625, pp. 341–355, 2023.
[19] Y. Li et al., “Self-supervised learning for smart home IoT anomaly detection,” Pattern Recognition Letters, vol. 162, pp. 29–36, 2023.
[20] L. Chen et al., “Explainable artificial intelligence (XAI) for anomaly detection in IoT: A review,” ACM Computing Surveys, vol. 56, no. 1, pp. 1–35, 2024.
[21] C. Suh et al., “IoT anomaly detection using ensemble of machine learning models,” Sensors, vol. 21, no. 19, p. 6483, 2021.
[22] M. Rahman and A. Hussain, “Lightweight intrusion detection for IoT: A survey,” Computer Communications, vol. 148, pp. 180–200, 2020.
[23] F. Restuccia and T. Melodia, “Deep learning at the edge for networked smart homes,” IEEE Wireless Communications, vol. 27, no. 4, pp. 12–18, 2020.
[24] Ferrag et al., “Anomaly detection and classification for smart home networks using LSTM,” Applied Soft Computing, vol. 113, p. 107889, 2021.
[25] R. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 1–58, 2009.
[26] S. Umer et al., “Machine learning-based intrusion detection in IoT: An overview,” Computer Networks, vol. 222, p. 109353, 2023.
[27] Zolanvari et al., “Machine learning-based network vulnerability analysis of industrial Internet of Things,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2766–2774, 2018.
[28] Liu et al., “Smart home anomaly detection using recurrent neural networks,” IEEE Access, vol. 7, pp. 53845–53856, 2019.
[29] J. Yang et al., “Unsupervised learning approaches for anomaly detection in smart homes,” Sensors, vol. 20, no. 12, p. 3420, 2020.
[30] G. Kolias et al., “Intrusion detection in smart environments using ensemble learning,” Future Generation Computer Systems, vol. 92, pp. 423–435, 2019.
[31] A. Diro and N. Chilamkurti, “Distributed attack detection scheme using deep learning approach for IoT,” Future Generation Computer Systems, vol. 82, pp. 761–768, 2018.
[32] M. Conti et al., “A survey on security and privacy issues in modern healthcare systems: Attacks and defenses,” IEEE Communications Surveys & Tutorials, vol. 20, no. 2, pp. 1123–1169, 2018.
[33] N. Khan and M. A. Kaafar, “Privacy and security in smart home: A machine learning perspective,” ACM Transactions on Internet Technology, vol. 22, no. 2, pp. 1–28, 2022.
[34] Kitchenham and S. Charters, “Guidelines for performing systematic literature reviews in software engineering,” EBSE Technical Report, 2007.
[35] S. V. Gogate and S. Bakshi, “Deep learning models for anomaly detection in smart environments,” Procedia Computer Science, vol. 171, pp. 1124–1133, 2020.
[36] Yavuz and I. Korkmaz, “Securing smart home systems using intelligent techniques,” IEEE Systems Journal, vol. 14, no. 3, pp. 3560–3570, 2020.
[37] E. Torres et al., “IoT anomaly detection using edge computing and federated learning,” Future Generation Computer Systems, vol. 137, pp. 242–253, 2023.
[38] M. Mohammadi et al., “A comprehensive review of anomaly detection techniques for high-dimensional big data,” Journal of Big Data, vol. 8, p. 37, 2021.
[39] E. Bertino and N. Islam, “Botnets and internet of things security,” Computer, vol. 50, no. 2, pp. 76–79, 2017.
[40] N. Abeshu and N. Chilamkurti, “Deep learning for anomaly detection in IoT: A survey,” Computer Communications, vol. 140, pp. 41–52, 2019.
[41] L. Xu et al., “Internet of Things security: A survey,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1129–1149, 2016.
[42] M. A. Ferrag et al., “Security and privacy for IoT and fog computing paradigm,” Computer Communications, vol. 98, pp. 52–69, 2017.
[43] H. HaddadPajouh et al., “A survey on internet of things security: Requirements, challenges, and solutions,” Computer Networks, vol. 148, pp. 283–294, 2019.
[44] T. R. Ioannidis et al., “A robust machine learning approach for detecting anomalies in smart homes,” IEEE Access, vol. 8, pp. 210273–210283, 2020.
[45] M. Hussain et al., “A framework for anomaly detection in smart home automation systems,” IEEE Systems Journal, vol. 13, no. 4, pp. 4295–4304, 2019.
[46] M. Zhang et al., “Anomaly detection in smart homes using transformer networks,” IEEE Access, vol. 10, pp. 4300–4312, 2022.
[47] L. Han et al., “Scalable IoT anomaly detection using distributed learning,” IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 454–467, 2022.
[48] K. Bakar et al., “A review of machine learning approaches for anomaly detection in IoT,” Wireless Personal Communications, vol. 115, pp. 3077–3101, 2020.
[49] D. Kumar and S. Tripathi, “Smart home security using anomaly detection,” Journal of Ambient Intelligence and Smart Environments, vol. 13, no. 1, pp. 25–40, 2021.
[50] L. Chen et al., “Explainable AI for trustworthy anomaly detection in IoT systems,” ACM Transactions on Internet Technology, vol. 24, no. 1, pp. 1–28, 2024.