Intrusion detection in Internet of Things with MQTT protocol—An accurate and interpretable genetic-fuzzy rule-based solution

MB Gorzałczany, F Rudziński - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
This article addresses the problem of an accurate and interpretable intrusion detection in
Internet of Things (IoT) systems using the knowledge-discovery data-mining/machine …

Ambient Intelligence health services using IoT

P Whig, K Gupta, N Jiwani… - Ambient Intelligence and …, 2022 - Wiley Online Library
Ambient intelligence refers to the combination of pervasive ubiquitous computing, big data
and artificial frameworks, IoT, sensor networks, and human‐computer interaction (HCI) …

A long short-term memory based approach for detecting cyber attacks in IoT using CIC-IoT2023 dataset

AI Jony, AKB Arnob - Journal of Edge Computing, 2024 - acnsci.org
The growth of Internet of Things (IoT) gadgets has ushered in a new era of connectedness
and convenience, but it has also sparked worries about security flaws. Long Short-Term …

Enhancing design thinking in engineering students with project‐based learning

C Jiang, Y Pang - Computer Applications in Engineering …, 2023 - Wiley Online Library
Modern society requires increasing creative talents. As an educational concept, design
thinking (DT) has been successfully applied in education to foster innovation. However …

Computer succoured vaticination of multi-object detection and histogram enhancement in low vision

R Chandrakar, R Raja, R Miri… - … Journal of Biometrics, 2023 - inderscienceonline.com
In this day and age, area calculation and detection methods are always in need of training
data. Although, labelling objects are not volatile approaches to solve the detection problem …

IoT networks attacks detection using multi-novel features and extra tree random-voting ensemble classifier (ER-VEC)

A Sarwar, MF Mushtaq, U Akram, F Rustam… - Journal of Ambient …, 2023 - Springer
Internet usage is increasing day by day all over the world and as a result, technology is also
developing to make daily life appliances as smart as possible. Millions of devices are …

Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier

ST Ikram, V Priya, B Anbarasu, X Cheng… - The Journal of …, 2022 - Springer
Several organizations are implementing large-scale Internet of Things (IoT)-based
ecosystems, such as Industrial IoT (IIoT). Such systems are vulnerable to new threats and …

An abnormal traffic detection method for IoT devices based on federated learning and depthwise separable convolutional neural networks

Q Xia, S Dong, T Peng - 2022 IEEE International Performance …, 2022 - ieeexplore.ieee.org
As a bridge for information interaction between people and things, and things and things, IoT
devices bring security issues and data privacy protection issues that have always been the …

Towards a generalized hybrid deep learning model with optimized hyperparameters for malicious traffic detection in the Industrial Internet of Things

B Babayigit, M Abubaker - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
Detecting malicious attacks in Industrial Internet of Things (IIoT) is crucial to minimize
downtime and financial losses. However, existing deep learning (DL) research faces …

[HTML][HTML] Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things

V Akshaya, V Mandala, C Anilkumar, P VishnuRaja… - Measurement …, 2023 - Elsevier
Exponential increases in smart devices and reduced costs of sensors have increased
applications using IoT (Internet of Things). There has been an extensive analysis on the …