[HTML][HTML] Deep Autoencoder-Based Integrated Model for Anomaly Detection and Efficient Feature Extraction in IoT Networks

KA Alaghbari, HS Lim, MHM Saad, YS Yong - IoT, 2023 - mdpi.com
The intrusion detection system (IDS) is a promising technology for ensuring security against
cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and …

[HTML][HTML] Transparent Rule Enablement Based on Commonization Approach in Heterogeneous IoT Edge Networks

W Jin, YG Hong, J Song, J Kim, D Kim - Sensors, 2023 - mdpi.com
The paradigm of the Internet of Things (IoT) and edge computing brings a number of
heterogeneous devices to the network edge for monitoring and controlling the environment …

Integrated privacy preservation with novel encoding and encryption for securing video in internet-of-things

R Shahabadkar, S Govinda, S Firdose - Computer Science On-line …, 2023 - Springer
With the modernization of communication and security processes, the mechanism of video
security system has also undergone a tremendous transformation leading to intelligence …

Automatic Generation of CEP Rules using Data Analysis Techniques and Model-Driven Engineering

M Gholami, B Zamani… - 2023 7th International …, 2023 - ieeexplore.ieee.org
The widespread use of Internet of Things (IoT) systems results in a large volume of data that
needs to be analyzed in real time for efficient usage. Complex Event Processing (CEP) is a …

Unleashing the Power of QoS: A Comprehensive Study and Evaluation of Services-based Scheduling Techniques for Fog Computing

M Rani, K Guleria, SN Panda - … of Intelligent Systems and Applications in …, 2024 - ijisae.org
Fog computing, a special worldview, has become famous for applications or technology that
should be area and dormancy delicate. It is a powerful expansion to distributed computing …

A Comparative Study on Machine Learning and Fuzzy Logic-Based Approach for Enhancing Credit Card Fraud Detection

BN Rao, M Bharathiraja - International Journal of Intelligent Systems and …, 2024 - ijisae.org
The present research evaluates the efficacy of several machine learning models in credit
card fraud detection, employing data sets of 284,407 transactions produced from online …

[PDF][PDF] The role of big data in detecting and preventing financial fraud in digital transactions

EO Udeh, P Amajuoyi, KB Adeusi, AO Scott - 2024 - wjarr.com
In the era of digital transactions, the proliferation of financial fraud poses significant
challenges to the security and integrity of financial systems worldwide. Amidst this …

Unsupervised Online Event Ranking for IT Operations

TC Mendes, AA Barata, M Pereira… - … on Intelligent Data …, 2023 - Springer
Keeping high service levels of a fast-growing number of servers is crucial and challenging
for IT operations teams. Online monitoring systems trigger many occurrences that experts …

Analysis and Monitoring of Design Challenges in the Cyber Physical Systems in Manufacturing Sectors Using Cloud Computing

L Natrayan - Cyber-Physical Systems and Supporting Technologies …, 2023 - igi-global.com
The integration of additive manufacturing (AM) technology, commonly known as 3D printing,
into industrial processes has led to the adoption of Industry 4.0 principles. This includes the …

[PDF][PDF] Enhancing the IoT by incorporating 5G Technology

N Shahani - Journal Homepage: http://www. ijmra. us, 2024 - researchgate.net
The primary goal of this dissertation is to understand how to enhance the Internet of Things
by incorporating fifth-generation technology, which is increasing daily. As a result, it is critical …