Joint Publications
2025
Sodhro, A.H., Mughal, M.I.Y., Iqbal, M.J. (2025). 5G Beyond for Healthcare: Leveraging AI/ML and Diverse Datasets for Cybersecurity. In: Abie, H., Gkioulos, V., Katsikas, S., Pirbhulal, S. (eds) Secure and Resilient Digital Transformation of Healthcare. SUNRISE 2024. Communications in Computer and Information Science, vol 2404. Springer, Cham. https://doi.org/10.1007/978-3-031-85558-0_3
Abstract
The rapid adoption of 5G networks, space networks, and Internet of Things (IoT) technologies in healthcare has significantly expanded the attack surface for cybersecurity threats. This evolving landscape demands robust defense mechanisms that can anticipate and neutralize sophisticated cyber-attacks. Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) technologies are pivotal in developing such advanced cybersecurity solutions. A critical factor influencing the effectiveness of these AI/ML models is the quality and diversity of the datasets used in their training. This paper presents a systematic review of various datasets used for AI/ML-based cybersecurity model training across multiple domains, with a focus on 5G networks, IoT healthcare, and space networks. By employing a structured Goal-Question-Metric (GQM) methodology and Quasi-Gold Standard (QGS) validation, we assessed the characteristics, applications, and limitations of real, synthetic, and hybrid datasets in enhancing cybersecurity measures. The review identifies key trends, gaps, and future research directions, highlighting the need for more diverse datasets, standardized benchmarks, and privacy-preserving techniques. Our findings offer insights into improving the resilience of AI/ML models for cybersecurity, guiding the development of more effective and adaptable defense strategies across emerging network technologies.
2024
L. I. Isin, Y. Dalveren, E. Leka and A. Kara, “Securing the Internet of Things: Challenges and Complementary Overview of Machine Learning-Based Intrusion Detection,” 2024 Innovations in Intelligent Systems and Applications Conference (ASYU), Ankara, Turkiye, 2024, pp. 1-4, doi: 10.1109/ASYU62119.2024.10757068.
Abstract
The significant increase in the number of IoT devices has also brought with it various security concerns. The ability of these devices to collect a lot of data, including personal information, is one of the important reasons for these concerns. The integration of machine learning into systems that can detect security vulnerabilities has been presented as an effective solution in the face of these concerns. In this review, it is aimed to examine the machine learning algorithms used in the current studies in the literature for IoT network security. Based on the authors’ previous research in physical layer security, this research also aims to investigate the intersecting lines between upper layers of security and physical layer security. To achieve this, the current state of the area is presented. Then, relevant studies are examined to identify the key challenges and research directions as an initial overview within the authors’ ongoing project.