Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things
D Manivannan - Journal of Network and Computer Applications, 2024 - Elsevier
The significant advancements in sensors and other resource-constrained devices, capable
of collecting data and communicating wirelessly, are poised to revolutionize numerous …
of collecting data and communicating wirelessly, are poised to revolutionize numerous …
The 3-axis scalable service-cloud resource modeling for burst prediction under smart campus scenario
Internet of Things (IoT) enables smart campuses more convenient for cloud services. The
availability of cloud resources to its users appears as a fundamental challenge. The existing …
availability of cloud resources to its users appears as a fundamental challenge. The existing …
[HTML][HTML] A Deep Anomaly Detection System for IoT-Based Smart Buildings
In recent years, technological advancements in sensor, communication, and data storage
technologies have led to the increasingly widespread use of smart devices in different types …
technologies have led to the increasingly widespread use of smart devices in different types …
Toward the Selection of a Lightweight Authentication Technique for the Security of Smart Homes: Framework Architecture Based on a User Centric Design
Abstract The Internet of things (IoT) is known today as a substantial technology due to variety
of its applications resulting in a huge circulation of users' private information. Thus, it poses …
of its applications resulting in a huge circulation of users' private information. Thus, it poses …
Trajectory analysis method based on video surveillance anomaly detection
X Zhou, Y Chen, Q Zhang - 2021 China Automation Congress …, 2021 - ieeexplore.ieee.org
Video surveillance system monitors potential malicious activities through video images,
which is also an important part of city security prevention. In order to improve the application …
which is also an important part of city security prevention. In order to improve the application …
Deep Trust: A Novel Framework for Dynamic Trust and Reputation Management in the Internet of Things (IoT) Based Networks
The proliferation of the Internet of Things (IoT) has brought unprecedented connectivity,
introducing complex trust and reputation management challenges across vast …
introducing complex trust and reputation management challenges across vast …
Effective anomaly detection approach to classify noisy data using robust noise detection and removal technique in IoT healthcare data
S Subha, JGR Sathiaseelan - SN Computer Science, 2023 - Springer
In IoT, it is a collection of connected devices or sensors that allows data to be collected and
shared over the internet. Sensor data quality is critical in IoT applications since they become …
shared over the internet. Sensor data quality is critical in IoT applications since they become …
Effective anomaly detection in hybrid wireless IoT environment through machine learning model: a survey
V Shanmuganathan… - International Journal of …, 2023 - inderscienceonline.com
Wireless hybrid environment has seamlessly integrated inside all smart homes and in smart
environments. Assaults and Anomalies are probably going to happen in open platform of IoT …
environments. Assaults and Anomalies are probably going to happen in open platform of IoT …
PRIAH: private alerts in healthcare
AM Said, A Yahyaoui, T Abdellatif - … Conference on Risks and Security of …, 2022 - Springer
Privacy is today a mandatory property to implement in modern systems and particularly in
Healthcare systems where patients' personal data is exchanged between different persons …
Healthcare systems where patients' personal data is exchanged between different persons …
A network design scheme in delay sensitive monitoring services
A Kawabata, T Tojo, BC Chatterjee… - IEICE Transactions on …, 2023 - search.ieice.org
Mission-critical monitoring services, such as finding criminals with a monitoring camera,
require rapid detection of newly updated data, where suppressing delay is desirable. Taking …
require rapid detection of newly updated data, where suppressing delay is desirable. Taking …