[HTML][HTML] Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity

P Dini, A Elhanashi, A Begni, S Saponara, Q Zheng… - Applied Sciences, 2023 - mdpi.com
The Intrusion Detection System (IDS) is an effective tool utilized in cybersecurity systems to
detect and identify intrusion attacks. With the increasing volume of data generation, the …

[HTML][HTML] Integration of deep learning into the iot: A survey of techniques and challenges for real-world applications

A Elhanashi, P Dini, S Saponara, Q Zheng - Electronics, 2023 - mdpi.com
The internet of things (IoT) has emerged as a pivotal technological paradigm facilitating
interconnected and intelligent devices across multifarious domains. The proliferation of IoT …

Real‐time electro‐thermal modelling and predictive control design of resonant power converter in full electric vehicle applications

P Dini, G Ariaudo, G Botto, FL Greca… - IET Power …, 2023 - Wiley Online Library
In this paper, a resonant converter model is proposed that takes into account the thermal
and electrical dynamics of the main components. With respect to state‐of‐art, where model …

[HTML][HTML] Overview on battery charging systems for electric vehicles

P Dini, S Saponara, A Colicelli - Electronics, 2023 - mdpi.com
Catalyzed by the increasing interest in bi-directional electric vehicles, this paper delves into
their significance and the challenges they encounter. Bi-directional electric vehicles not only …

Review on modeling and soc/soh estimation of batteries for automotive applications

P Dini, A Colicelli, S Saponara - Batteries, 2024 - mdpi.com
Lithium-ion batteries have revolutionized the portable and stationary energy industry and
are finding widespread application in sectors such as automotive, consumer electronics …

MAGRU-IDS: A multi-head attention-based gated recurrent unit for intrusion detection in IIoT networks

S Ullah, W Boulila, A Koubaa, J Ahmad - IEEE Access, 2023 - ieeexplore.ieee.org
The increasing prevalence of the Industrial Internet of Things (IIoT) in industrial
environments amplifies the potential for security breaches and compromises. To monitor IIoT …

[HTML][HTML] Determining Resampling Ratios Using BSMOTE and SVM-SMOTE for Identifying Rare Attacks in Imbalanced Cybersecurity Data

SS Bagui, D Mink, SC Bagui, S Subramaniam - Computers, 2023 - mdpi.com
Machine Learning is widely used in cybersecurity for detecting network intrusions. Though
network attacks are increasing steadily, the percentage of such attacks to actual network …

[HTML][HTML] Modeling and control simulation of power converters in automotive applications

P Dini, S Saponara - Applied Sciences, 2024 - mdpi.com
This research introduces a model-based approach for the analysis and control of an
onboard charger (OBC) system for contemporary electrified vehicles. The primary objective …

Real‐time monitoring and ageing detection algorithm design with application on SiC‐based automotive power drive system

P Dini, G Basso, S Saponara… - IET Power Electronics, 2024 - Wiley Online Library
The article describes an innovative methodology for the design and experimental validation
of monitoring and anomaly detection algorithms, with a particular focus on the aging …

[HTML][HTML] An integrated and real-time social distancing, mask detection, and facial temperature video measurement system for pandemic monitoring

A Elhanashi, S Saponara, P Dini, Q Zheng… - Journal of Real-Time …, 2023 - Springer
This paper presents a new Edge-AI algorithm for real-time and multi-feature (social
distancing, mask detection, and facial temperature) measurement to minimize the spread of …