Machine learning for coverage optimization in wireless sensor networks: a comprehensive review
In the context of wireless sensor networks (WSNs), the utilization of artificial intelligence (AI)-
based solutions and systems is on the ascent. These technologies offer significant potential …
based solutions and systems is on the ascent. These technologies offer significant potential …
Utilize DBN and DBSCAN to detect selective forwarding attacks in event-driven wireless sensors networks
Q Li, Y Ma, Y Wu - Engineering Applications of Artificial Intelligence, 2023 - Elsevier
Malicious nodes launching selective forwarding attacks jeopardize network reliability in
event-driven wireless sensor networks. Swift detection and exclusion of these nodes are …
event-driven wireless sensor networks. Swift detection and exclusion of these nodes are …
Advancing security and trust in wsns: A federated multi-agent deep reinforcement learning approach
H Moudoud, Z Abou El Houda… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) show significant potential through their ability to collect
and analyze real-time data, notably enhancing various sectors. The new emerging security …
and analyze real-time data, notably enhancing various sectors. The new emerging security …
[HTML][HTML] Towards a lightweight security framework using blockchain and machine learning
Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor
networks, necessitating the development of robust countermeasures tailored to their unique …
networks, necessitating the development of robust countermeasures tailored to their unique …
Detection and prevention of sinkhole attacks in MANETS based routing protocol using hybrid AdaBoost-Random forest algorithm
SSM Vincent, N Duraipandian - Expert Systems with Applications, 2024 - Elsevier
Abstract WSN (Wireless Sensor Network) is considered as one of the promising
technologies which are utilized in various fields for various applications. Along with it …
technologies which are utilized in various fields for various applications. Along with it …
A Comparative Study of Lightweight Machine Learning Techniques for Cyber-attacks Detection in Blockchain-Enabled Industrial Supply Chain
The security of Industrial Supply Chain (ISC) has emerged through the integration of
Industrial Internet of Things (IIoT) and Blockchain (BC) technology. This new era involves …
Industrial Internet of Things (IIoT) and Blockchain (BC) technology. This new era involves …
Using Multi-Armed Bandit Learning for Thwarting MAC Layer Attacks in Wireless Networks
This paper proposes a learning-driven approach for medium access slot allocation in the
presence of malicious nodes. Learning policies are developed with the goal of defending …
presence of malicious nodes. Learning policies are developed with the goal of defending …
A comparative study of datasets for cyber-attacks detection in wireless sensor networks
Machine Learning (ML) is one of the effective security approaches to build cyber-attacks
detection systems in Wireless Sensor Networks (WSNs). ML leverages the power of data …
detection systems in Wireless Sensor Networks (WSNs). ML leverages the power of data …
Prevention of Security Attacks at Wireless Network Layers using Machine Learning Techniques
S Ramisetty, GSP Ghantasala… - 2024 11th International …, 2024 - ieeexplore.ieee.org
Wireless sensor networks have great potential for use in flood control, weather forecasting
systems, the military, and the healthcare industry. A WSN's nodes are connected to one …
systems, the military, and the healthcare industry. A WSN's nodes are connected to one …
Using Complex Network Analysis Techniques to Uncover Fraudulent Activity in Connected Healthcare Systems
SK Rajamani, RS Iyer - Practical Applications of Data Processing …, 2024 - igi-global.com
Complex network analysis is a powerful approach for finding fraud in a network. This is an
application of graph theory that enables the depiction of relationships between entities as …
application of graph theory that enables the depiction of relationships between entities as …