[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review

P Shukla, CR Krishna, NV Patil - The Journal of Supercomputing, 2024 - Springer
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …

An Optimized Bio-inspired Localization Routing Technique for Sustainable IIoT Networks & Green Cities

P Chithaluru, F Al-Turjman, T Stephan, M Kumar… - Sustainable Cities and …, 2023 - Elsevier
Abstract The industrial Internet of Things (IIoTs) network life is shortened due to sensor node
(SN) energy limitations and computational capability. As a result, optimum node location …

A cooperation federated forwarder selection technique for maximizing network lifetime in wireless sensor network

R Tiwari, P Chithaluru, K Kumar, M Kumar, T Stephan - Sādhanā, 2023 - Springer
Abstract Wireless Sensor Network (WSN) fulfills the requirements to solve real-life
applications due to their unattended nature. But, the main constraint faced by researchers is …

A Hierarchical Network Management Strategy for Distributed CIIoT With Imperfect CSI

F Yang, S Zhang, C Liu, J Huang, T Yu… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the distributed Cognitive Industrial Internet of Things (CIIoT), since industrial devices may
self-organize to determine their connection and dispersion and the network may be …

Multi-Agent System Based Data Mining Technique for Supplier Selection

JS Dhatterwal, KS Kaswan, J Singh… - … on Power Energy …, 2023 - ieeexplore.ieee.org
Different target knowledge representations, which correspond to different hypothesis
spaces, are suitable for learning various types of target functions. A distinct learning …

An opportunistic energy‐efficient dynamic self‐configuration clustering algorithm in WSN‐based IoT networks

S Tumula, Y Ramadevi, E Padmalatha… - International Journal …, 2024 - Wiley Online Library
The demand for the Internet of Things (IoT) has significantly increased in the current
scenario; specific sectors that require IoT include industrial automation, home control, health …

An optimized meta‐heuristic clustering‐based routing scheme for secured wireless sensor networks

G Kiran Kumar, SK Prashanth… - International Journal …, 2024 - Wiley Online Library
Privacy and security present significant challenges in wireless sensor networks (WSNs). In
order to enhance security, the sensor network is equipped with high throughput. While the …

A Lightweight Energy-Efficient Routing Scheme for Real-Time WSN-VANET-Based Applications

P Chithaluru, R Uyyala, A Singh… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
An extensive examination reveals that Wireless Sensor Networks (WSNs) offer a promising
solution for essential sensing and event-driven data communication needs. WSNs hold …

[HTML][HTML] Hierarchical Plan Execution for Cooperative UxV Missions

J de Gier, J Bergmans, H Hildmann - Robotics, 2023 - mdpi.com
A generic reasoning approach for autonomous unmanned vehicle (UxV) mission execution
is presented. The system distinguishes (a) mission planning and (b) mission execution …