Securing smart manufacturing by integrating anomaly detection with zero-knowledge proofs
In the rapidly advancing domain of smart manufacturing, securing data integrity and
preventing unauthorized access are critical challenges. This study introduces a novel …
preventing unauthorized access are critical challenges. This study introduces a novel …
Dual-path feature extraction based hybrid intrusion detection in IoT networks
AK Silivery, KRM Rao, R Solleti - Computers and Electrical Engineering, 2025 - Elsevier
A significant concern in the current computing industry is safeguarding Internet of Things
(IoT) networks due to the rapid rise in cyberattacks and security lapses. Previously …
(IoT) networks due to the rapid rise in cyberattacks and security lapses. Previously …
Membership Inference Attacks Against Incremental Learning in IoT Devices
Internet of Things (IoT) devices are frequently deployed in highly dynamic environments and
need to continuously learn new classes from data streams. Incremental Learning (IL) has …
need to continuously learn new classes from data streams. Incremental Learning (IL) has …
Attention-Based Hybrid Deep Learning Model for Intrusion Detection in IIoT Networks
Abstract The integration of Industrial Internet of Things (IIoT) technology into the industrial
sector has produced numerous significant advantages. However, the notable concern …
sector has produced numerous significant advantages. However, the notable concern …
An adaptive nonlinear whale optimization multi-layer perceptron cyber intrusion detection framework
H El-Ghaish, H Miqrish, A Elmogy… - International Journal of …, 2024 - Springer
The increasing prevalence of cyber threats has created a critical need for robust defense
against such incidents. Many Cyber Intrusion Detection Systems (CIDSs), utilizing machine …
against such incidents. Many Cyber Intrusion Detection Systems (CIDSs), utilizing machine …
Advanced Imaging Technologies With Ensemble Learning for Consumer Products Identification and Classification
Consumer product recognition involves utilizing computer vision (CV) and machine learning
(ML) systems for identifying and recognizing numerous consumer goods in video or image …
(ML) systems for identifying and recognizing numerous consumer goods in video or image …
Mayfly optimistic hyperelliptic curve cryptosystem
R Nava Teja Reddy, M Kavitha, GS Reddy… - Frontiers in Computer …, 2024 - frontiersin.org
Various applications use asymmetric cryptography to secure communications between both
parties, and it raises the main issue of generating vast amounts of computation and storage …
parties, and it raises the main issue of generating vast amounts of computation and storage …
IoT network Malicious Behaviour Profiling Based on Explainable AI Using LSTM and SHAP
S Niktabe - 2024 - yorkspace.library.yorku.ca
The proliferation of IoT devices has enhanced connectivity but exposed networks to new
cyber threats, particularly from botnets. Detecting and identifying malicious data is critical for …
cyber threats, particularly from botnets. Detecting and identifying malicious data is critical for …
[PDF][PDF] A Novel Approach for Intrusion Detection System in IoT Using Correlation-Based Hybrid Feature Selection and Harris Hawk Optimization Algorithm
Y Salami, Y Ebazadeh, M Hamrang… - Journal of Optimization …, 2024 - researchgate.net
With the rapid growth of the IoT, the number of devices connected to various networks has
significantly increased. These devices generate vast amounts of data and are often …
significantly increased. These devices generate vast amounts of data and are often …
[PDF][PDF] Mayfly optimistic hyperelliptic curve cryptosystem
Information security is important in today's world as every transaction becomes digitized. For
legal and profitable trading, integrity, confidentiality, non-reputability, and integrity of the …
legal and profitable trading, integrity, confidentiality, non-reputability, and integrity of the …