Volume 13 (2025)
Volume 12 (2024)
Volume 11 (2023)
Volume 10 (2022)
Volume 9 (2021)
Volume 8 (2020)
Volume 7 (2019)
Volume 6 (2018)
Volume 5 (2017)
Volume 4 (2016)
Volume 3 (2015)
Volume 2 (2014)
Volume 1 (2013)
B.3. Communication/Networking and Information Technology
Anomaly Detection in IoT Traffic in the Presence of Gaussian Noise Using Deep Neural Networks

Roya Morshedi; S. Mojtaba Matinkhah

Volume 13, Issue 3 , July 2025, , Pages 305-319

https://doi.org/10.22044/jadm.2025.15672.2684

Abstract
  The Internet of Things (IoT) is a rapidly growing domain essential for modern smart services. However, resource limitations in IoT nodes create significant security vulnerabilities, making them prone to cyberattacks. Deep learning models have emerged as effective tools for detecting anomalies in IoT ...  Read More

B.3. Communication/Networking and Information Technology
Intrusion Detection for IoT Network Security with Deep learning

Roya Morshedi; S. Mojtaba Matinkhah; Mohammad Taghi Sadeghi

Volume 12, Issue 1 , January 2024, , Pages 37-55

https://doi.org/10.22044/jadm.2023.13539.2471

Abstract
  IoT devices has witnessed a substantial increase due to the growing demand for smart devices. Intrusion Detection Systems (IDS) are critical components for safeguarding IoT networks against cyber threats. This study presents an advanced approach to IoT network intrusion detection, leveraging deep learning ...  Read More

B.3. Communication/Networking and Information Technology
Exploring Impact of Data Noise on IoT Security: a Study using Decision Tree Classification in Intrusion Detection Systems

S. Mojtaba Matinkhah; Roya Morshedi; Akbar Mostafavi

Volume 11, Issue 4 , November 2023, , Pages 609-626

https://doi.org/10.22044/jadm.2023.12964.2442

Abstract
  The Internet of Things (IoT) has emerged as a rapidly growing technology that enables seamless connectivity between a wide variety of devices. However, with this increased connectivity comes an increased risk of cyber-attacks. In recent years, the development of intrusion detection systems (IDS) has ...  Read More