ExplorerEngineering ResearchEngineering
Research PaperResearchia:202602.03146

Securing IoT Infrastructures Using Honeypot-Based Intrusion Detection (IDS) and AES-256 Encryption: A Comprehensive Survey

IJERT

Abstract

View Abstract & download full text of Securing IoT Infrastructures Using Honeypot-Based Intrusion Detection (IDS) and AES-256 Encryption: A Comprehensive Survey... --- Source: International Journal of Engineering Research & Technology - https://www.ijert.org/securing-iot-infrastructures-using-honeypot-based-intrusion-detection-ids-and-aes-256-encryption-a-comprehensive-survey-ijertv15is010573 PDF: https://www.ijert.org/securing-iot-infrastructures-using-honeypot-based-intrusion-detection-ids-and...

Submitted: February 3, 2026Subjects: Engineering; Engineering Research

Description / Details

View Abstract & download full text of Securing IoT Infrastructures Using Honeypot-Based Intrusion Detection (IDS) and AES-256 Encryption: A Comprehensive Survey...


Source: International Journal of Engineering Research & Technology - https://www.ijert.org/securing-iot-infrastructures-using-honeypot-based-intrusion-detection-ids-and-aes-256-encryption-a-comprehensive-survey-ijertv15is010573 PDF: https://www.ijert.org/securing-iot-infrastructures-using-honeypot-based-intrusion-detection-ids-and-aes-256-encryption-a-comprehensive-survey-ijertv15is010573 Original Article: View on IJERT

Please sign in to join the discussion.

No comments yet. Be the first to share your thoughts!

Access Paper
View Source PDF
Submission Info
Date:
Feb 3, 2026
Topic:
Engineering Research
Area:
Engineering
Comments:
0
Bookmark