[HTML][HTML] Intelligent fog computing surveillance system for crime and vulnerability identification and tracing

R Rawat, RK Chakrawarti, P Vyas… - International Journal of …, 2023 - igi-global.com
IoT devices generate enormous amounts of data, which deep learning algorithms can learn
from more effectively than shallow learning algorithms. The approach for threat detection …

Rooted learning model at fog computing analysis for crime incident surveillance

R Rawat, V Mahor, J Díaz-Álvarez… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
Cyber Loopholes in smart devices' applications invited intruders to conduct malicious
activities. The growing quantity and diversity of smart devices has posed significant cyber …

[HTML][HTML] Deep learning architecture for detecting SQL injection attacks based on RNN autoencoder model

M Alghawazi, D Alghazzawi, S Alarifi - Mathematics, 2023 - mdpi.com
SQL injection attacks are one of the most common types of attacks on Web applications.
These attacks exploit vulnerabilities in an application's database access mechanisms …

[HTML][HTML] Reducing large adaptation spaces in self-adaptive systems using classical machine learning

F Quin, D Weyns, O Gheibi - Journal of Systems and Software, 2022 - Elsevier
Modern software systems often have to cope with uncertain operation conditions, such as
changing workloads or fluctuating interference in a wireless network. To ensure that these …

IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection

K Kostas, M Just, MA Lones - arXiv preprint arXiv:2401.01343, 2023 - arxiv.org
Previous research on behaviour-based attack detection on networks of IoT devices has
resulted in machine learning models whose ability to adapt to unseen data is limited, and …

Parametric entropy based Cluster Centriod Initialization for k-means clustering of various Image datasets

F Hussayn, SM Shah - arXiv preprint arXiv:2308.07705, 2023 - arxiv.org
One of the most employed yet simple algorithm for cluster analysis is the k-means algorithm.
k-means has successfully witnessed its use in artificial intelligence, market segmentation …

IoT Cyberattack Detection Approach Based on Energy Consumption Analysis

K Bobrovnikova, O Savenko… - 2022 12th …, 2022 - ieeexplore.ieee.org
Today, the Internet of Things has been widely used and is becoming an increasingly vital
part in various areas of human activity, which helps to effectively solve various real-life tasks …

Engineering Software Systems with Self-Adaptation and Machine Learning

F Quin - 2023 - lirias.kuleuven.be
Modern software systems are often deployed in dynamic and uncertain environments, where
the operating conditions of the system are difficult to predict before the system is in …