Optimized neural network model for attack detection in LTE network

KK Jyothi, S Chaudhari - Computers & Electrical Engineering, 2020 - Elsevier
Abstract Machine-type communication (MTC) senses our environment througfh connecting
millions of devices to one another, and becomes an enabler for context-aware and …

[引用][C] Effective learning-based attack detection methods for the Internet of Things

K Albulayhi, QA Al-Haija, FT Sheldon - Computing, 2022

Ldos attacker detection algorithms in zigbee network

S Okada, D Miyamoto, Y Sekiya… - … on Internet of Things …, 2021 - ieeexplore.ieee.org
Low-Rate DoS (LDoS) attacks degrade the quality of service with less traffic than ordinary
DoS attacks. LDoS attacks can easily evade conventional counter-DoS detection …

EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things

AO Bang, UP Rao - Peer-to-Peer Networking and Applications, 2022 - Springer
Abstract Routing Protocol for Low Power and Lossy Networks (RPL) is the only standard
protocol that assists the routing process in Low Power and Lossy Networks (LLNs)-based …

Learning to recognize vulnerable patterns due to undesirable Zone‐3 relay operations

K Yamashita, J Li, CC Liu, P Zhang… - IEEJ transactions on …, 2009 - Wiley Online Library
Undesirable zone 3 relay operations caused by unexpected loading conditions can
contribute to the cascaded events, leading to catastrophic outages. Identifying the basic …

Buffer-aided relay selection for wireless cooperative relay networks with untrusted relays

C Zhang, X Liao, Z Wu, G Qiu - 2021 International Conference …, 2021 - ieeexplore.ieee.org
Wireless cooperative relay networks are widely used in various fields. Wireless channels are
vulnerable to eavesdroppers because of the broadcast characteristics of wireless channels …

A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks

AK Kamboj, P Jindal, P Verma - Annals of Telecommunications, 2024 - Springer
Physical layer security (PLS) has cropped up as a promising solution to secure the wireless
network. Cooperative communication is capable of improving the PLS, in addition to …

Preventing false tripping cyberattacks against distance relays: A deep learning approach

YM Khaw, AA Jahromi, AM FM… - … for smart grids …, 2019 - ieeexplore.ieee.org
The false tripping of circuit breakers initiated by cyberattacks on protective relays is a
growing concern in power systems. This is of high importance because multiple false …

Autoencoder-based network anomaly detection

Z Chen, CK Yeo, BS Lee, CT Lau - 2018 Wireless …, 2018 - ieeexplore.ieee.org
Anomaly detection is critical given the raft of cyber attacks in the wireless communications
these days. It is thus a challenging task to determine network anomaly more accurately. In …

A new abnormal node detection method with dynamic Hoeffding test

Y Huangfu, L Zhou, F Zhou - IEEE Wireless Communications …, 2022 - ieeexplore.ieee.org
In this letter, we propose a new method based on the dynamic Hoeffding test that can
distinguish the abnormal relay nodes from those with normal packet loss in wireless …