Deep learning for anomaly detection in multivariate time series: Approaches, applications, and challenges
Anomaly detection has recently been applied to various areas, and several techniques
based on deep learning have been proposed for the analysis of multivariate time series. In …
based on deep learning have been proposed for the analysis of multivariate time series. In …
A comprehensive study of DDoS attacks over IoT network and their countermeasures
IoT offers capabilities to gather information from digital devices, infer from their results, and
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …
DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges
In recent times, distributed denial of service (DDoS) has been one of the most prevalent
security threats in internet-enabled networks, with many internet of things (IoT) devices …
security threats in internet-enabled networks, with many internet of things (IoT) devices …
DDoS attacks in Industrial IoT: A survey
S Chaudhary, PK Mishra - Computer Networks, 2023 - Elsevier
As the IoT expands its influence, its effect is becoming macroscopic and pervasive. One of
the most discernible effects is in the industries where it is known as Industrial IoT (IIoT). IIoT …
the most discernible effects is in the industries where it is known as Industrial IoT (IIoT). IIoT …
DDoS attack detection in IoT-based networks using machine learning models: a survey and research directions
With the emergence of technology, the usage of IoT (Internet of Things) devices is said to be
increasing in people's lives. Such devices can benefit the average individual, who does not …
increasing in people's lives. Such devices can benefit the average individual, who does not …
Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
A Binbusayyis - Expert Systems with Applications, 2024 - Elsevier
Fog computing (FC) extends cloud technology by providing services, storage, and network
interaction between data centers and end devices. By putting storage and processing closer …
interaction between data centers and end devices. By putting storage and processing closer …
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …
Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments
Abstract The Internet of Things (IoT) has emerged over the past ten years as the newest
technology trend that is luring researchers and developers from every sector of industry and …
technology trend that is luring researchers and developers from every sector of industry and …
Energy and task completion time minimization algorithm for UAVs-empowered MEC SYSTEM
This paper presents an energy and task completion time minimization scheme for the
unmanned aerial vehicles (UAVs)-empowered mobile edge computing (MEC) system …
unmanned aerial vehicles (UAVs)-empowered mobile edge computing (MEC) system …
Anomaly detection using deep convolutional generative adversarial networks in the internet of things
AK Mishra, S Paliwal, G Srivastava - ISA transactions, 2024 - Elsevier
Advanced 5 G and 6 G technologies have accelerated the adoption of the Internet of Things
(IoT) and are a priority in providing support for high-speed communication and fast data …
(IoT) and are a priority in providing support for high-speed communication and fast data …