A survey of unmanned aerial vehicle flight data anomaly detection: Technologies, applications, and future directions
Flight data anomaly detection plays an imperative role in the safety and maintenance of
unmanned aerial vehicles (UAVs). It has attracted extensive attention from researchers …
unmanned aerial vehicles (UAVs). It has attracted extensive attention from researchers …
[HTML][HTML] Anomaly detection based on artificial intelligence of things: A systematic literature mapping
Abstract Advanced Machine Learning (ML) algorithms can be applied using Edge
Computing (EC) to detect anomalies, which is the basis of Artificial Intelligence of Things …
Computing (EC) to detect anomalies, which is the basis of Artificial Intelligence of Things …
[PDF][PDF] Anomaly Detection for Internet of Things Cyberattacks.
M Alanazi, A Aljuhani - Computers, Materials & Continua, 2022 - researchgate.net
The Internet of Things (IoT) has been deployed in diverse critical sectors with the aim of
improving quality of service and facilitating human lives. The IoT revolution has redefined …
improving quality of service and facilitating human lives. The IoT revolution has redefined …
Fast and progressive misbehavior detection in internet of vehicles based on broad learning and incremental learning systems
In recent years, deep learning (DL) has been widely used in vehicle misbehavior detection
and has attracted great attention due to its powerful nonlinear mapping ability. However …
and has attracted great attention due to its powerful nonlinear mapping ability. However …
[HTML][HTML] Smart Electricity Meter Load Prediction in Dubai Using MLR, ANN, RF, and ARIMA
HA Sayed, A William, AM Said - Electronics, 2023 - mdpi.com
Load forecasting is one of the main concerns for power utility companies. It plays a
significant role in planning decisions, scheduling, operations, pricing, customer satisfaction …
significant role in planning decisions, scheduling, operations, pricing, customer satisfaction …
Time series forecasting methods and their applications to particle accelerators
S Li, A Adelmann - Physical Review Accelerators and Beams, 2023 - APS
Particle accelerators are complex facilities that produce large amounts of structured data
and have clear optimization goals as well as precisely defined control requirements. As such …
and have clear optimization goals as well as precisely defined control requirements. As such …
CADeSH: Collaborative anomaly detection for smart homes
Y Meidan, D Avraham, H Libhaber… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Although home Internet of Things (IoT) devices are typically plain and task oriented, the
context of their daily use may affect their traffic patterns. That is, a given IoT device will …
context of their daily use may affect their traffic patterns. That is, a given IoT device will …
A Vertical Heterogeneous Network (VHetNet)–Enabled Asynchronous Federated Learning-Based Anomaly Detection Framework for Ubiquitous IoT
W Wang, O Abbasi, H Yanikomeroglu… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Anomaly detection for the Internet of Things (IoT) is a major intelligent service required by
many fields, including intrusion detection, state monitoring, device-activity analysis, and …
many fields, including intrusion detection, state monitoring, device-activity analysis, and …
[Retracted] Internet of Things Security Detection Technology Based on Grey Association Decision Algorithm
J Chang, X Zuo, B Hou, L Shi, G Zhang - Complexity, 2021 - Wiley Online Library
This paper analyzes the current real‐time monitoring system based on grey‐related IoT
security sensors for the detection of risk factors in the production environment of the Internet …
security sensors for the detection of risk factors in the production environment of the Internet …
A VHetNet-enabled asynchronous federated learning-based anomaly detection framework for ubiquitous IoT
Anomaly detection for the Internet of Things (IoT) is a major intelligent service required by
many fields, including intrusion detection, device-activity analysis, and security supervision …
many fields, including intrusion detection, device-activity analysis, and security supervision …