A survey on cyber security IDS using ML methods

P Parkar, A Bilimoria - 2021 5th International Conference on …, 2021 - ieeexplore.ieee.org
The growing rate of cyber-attacks on system networks in recent years exacerbates the
privacy and security of computer infrastructure and personal computers. Intrusion Detection …

A literature review on cloud based smart transport system

G Mobin, A Roy - 2021 5th international conference on trends in …, 2021 - ieeexplore.ieee.org
since the inception of human civilization, the invention of fire and wheel has played a vital
role in its gradual evolution through several decades. Precisely, after human beings have …

[PDF][PDF] Novel influence maximization algorithm for social network behavior management

D Sivaganesan - Journal of ISMAC, 2021 - scholar.archive.org
The users largely contributing towards product adoption or information utilization in social
networks are identified by the process of influence maximization. The exponential growth in …

[PDF][PDF] Physical layer protection against sensor eavesdropper channels in wireless sensor networks

A Bashar, S Smys - IRO Journal on Sustainable Wireless …, 2021 - scholar.archive.org
This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take
place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are …

Anomaly Detection in Self-Organizing Mobile Networks Motivated by Quality of Experience

S Caleb, SJJ Thangaraj - 2023 Fifth International Conference …, 2023 - ieeexplore.ieee.org
In today's self-organizing mobile communication networks, the approaches that are used for
anomaly detection use network-centric tactics to find faulty service nodes. These methods …

[PDF][PDF] Modified gray wolf feature selection and machine learning classification for wireless sensor network intrusion detection

S Shakya - IRO Journal on Sustainable Wireless Systems, 2021 - scholar.archive.org
The ability of wireless sensor networks (WSN) and their functions are degraded or
eliminated by means of intrusion. To overcome this issue, this paper presents a combination …

Clustering of WSN based on PSO with fault tolerance and efficient multidirectional routing

WS Kiran, S Smys, V Bindhu - Wireless Personal Communications, 2021 - Springer
The use of effective clustering algorithms can extend the life of wireless sensor networks. In
general, the clustering algorithm should have the ability to reduce the energy requirement …

Cyber physical system: Security challenges in internet of things system

BK Mohanta, MK Dehury, B Al Sukhni… - … Conference on I …, 2022 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) typically involve a number of networked systems that can
watch over and control actual processes and objects. They share many similarities with the …

Multi-objective cluster head-based energy-aware routing protocol using hybrid woodpecker and flamingo search optimization algorithm for internet of things …

P Arivubrakan… - International Journal of …, 2024 - World Scientific
Internet of Things (IoT) plays a vital role in the world of Internet and integrates computing
devices. The digital machines provide unique identifiers. The capacity to send data through …

Multi-objective binary reinforced cuckoo search algorithm for solving connected coverage target based WSN with critical targets

K Thirugnanasambandam, RS Raghav… - Wireless Personal …, 2021 - Springer
In the stream of WSN, covering the targets using sensors and communication among the
sensors to forward the data packets is a prime challenge due to the sparse target locations …