Seungyeon Baek1,#, Jueun Jeon2,#, Byeonghui Jeong1, Young-Sik Jeong1,*
CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 1213-1236, 2025, DOI:10.32604/cmes.2025.070679
- 30 October 2025
Abstract With the advent of the sixth-generation wireless technology, the importance of using artificial intelligence of things (AIoT) devices is increasing to enhance efficiency. As massive volumes of data are collected and stored in these AIoT environments, each device becomes a potential attack target, leading to increased security vulnerabilities. Therefore, intrusion detection studies have been conducted to detect malicious network traffic. However, existing studies have been biased toward conducting in-depth analyses of individual packets to improve accuracy or applying flow-based statistical information to ensure real-time performance. Effectively responding to complex and multifaceted threats in large-scale AIoT… More >