过去一年中添加的文章,按日期排序

Federated PCA on Grassmann Manifold for IoT Anomaly Detection

TA Nguyen, LT Le, TD Nguyen, W Bao… - arXiv preprint arXiv …, 2024 - arxiv.org
2 天前 - … Our approach enables real-time threat detection and mitigation at the device level,
… TON-IoT datasets show that our proposed methods offer performance in anomaly detection …

Enhancing Security in Satellite-Based IoT-HPC Cloud Architectures: A Hybrid AI based Security Framework Approach

SZ Ahmad, F Qamar - 2024 - researchsquare.com
3 天前 - … It is pertinent to mention that no single approach can provide absolute security. A
layered, hybrid approach combining various intrusion detection techniques will improve your …

Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system

A Hadabi, Z Qu, KH Yeh, CM Chen, S Kumari… - Journal of Systems …, 2024 - Elsevier
3 天前 - … is paramount in the Internet of Things (IoT)-based healthcare systems. Current
encryption … The security of our suggested approach depends on the difficulty of the following …

[HTML][HTML] Development and Application of IoT Monitoring Systems for Typical Large Amusement Facilities

Z Zhao, W Song, H Wang, Y Sun, H Luo - Sensors, 2024 - mdpi.com
4 天前 - … and equipment safety. By analyzing the collected physical signals, we facilitate
intelligent safety … This approach surpasses the limitations inherent in traditional periodic manual …

Integration of AI-powered vehicles with Smart City Infrastructure to transform the future of Automotive World

H SHRIMAL - 2024 - sae.org
4 天前 - … city infrastructure offers a holistic approach to urban mobility, fostering safer, more
efficient, and environmentally sustainable transportation systems. By leveraging advanced …

A privacy-preserving federated graph learning framework for threat detection in IoT trigger-action programming

Y Xing, L Hu, X Du, Z Shen, J Hu, F Wang - Expert Systems with …, 2024 - Elsevier
4 天前 - … provides robust privacy protection for the federated … privacy protection schemes
for threat detection in TAP rules. We evaluate PFTAP on the IFTTT dataset with over 10,000 rules

Fog-Based Ransomware Detection for Internet of Medical Things Using Lighweight Machine Learning Algorithms

RE Harzie, A Selamat, H Fujita, O Krejcar… - … Intelligent Systems, 2024 - Springer
4 天前 - … to computer systems, servers, and various applications across diverse industries
and enterprises. These security issues are of paramount importance and require immediate …

An Intrusion Detection System on The Internet of Things Using Deep Learning and Multi-objective Enhanced Gorilla Troops Optimizer

H Asgharzadeh, A Ghaffari, M Masdari… - Journal of Bionic …, 2024 - Springer
4 天前 - … The effectiveness of deep learning-based methods has been proven in … other
methods. In this paper, a feature extraction with convolutional neural network on Internet of Things

Understanding Farmer Perceptions: Impacts on Agricultural IoT Adoption in Western Cape, South Africa

A Kent, Z Ruhwanya - Annual Conference of South African Institute of …, 2024 - Springer
4 天前 - … by the cultural change required to adopt IoT. “…There are still staff members in our
operation that don’t see the full potential of what they gain by using these systems. They aren…

3 Integration of

E Artificial, M Chaudhary, MA Alam… - … Intelligence, Internet of …, 2024 - books.google.com
4 天前 - … cutting-edge methods for protecting the IoT by fusing blockchain technology are
systematically reviewed. The focus is on the architecture of the IoT, its security needs, difficulties…