A critical review on intrusion detection systems in IoT based on ML approach: A Survey

N Maheswaran, G Logeswari, S Bose… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) is extensively applied in a number of domains such as environmental
monitoring, industrial processes, home automation, healthcare etc. due to numerous …

High density sensor networks intrusion detection system for anomaly intruders using the slime mould algorithm

MH Alwan, YI Hammadi, OA Mahmood, A Muthanna… - Electronics, 2022 - mdpi.com
The Intrusion Detection System (IDS) is an important feature that should be integrated in
high density sensor networks, particularly in wireless sensor networks (WSNs). Dynamic …

A Survey: An Effective Utilization of Machine Learning Algorithms in IoT Based Intrusion Detection System

B Natarajan, S Bose, N Maheswaran… - 2023 12th …, 2023 - ieeexplore.ieee.org
With tremendous advancements in technologies, the life has become easier while on other
end, security issues pose a serious threat. Cyberattacks have increased by multiple folds …

A convolutional neural network for face mask detection in IoT-based smart healthcare systems

T Vaiyapuri, TA Ahanger, F Dahan, F Hajjej… - Frontiers in …, 2023 - frontiersin.org
The new coronavirus that produced the pandemic known as COVID-19 has been going
across the world for a while. Nearly every area of development has been impacted by …

Network Anomaly Based Detection Using Multivariate Correlation Analysis Technique

T Anitha, S Bose, G Logeswari… - … and Control for …, 2023 - ieeexplore.ieee.org
In order to identify if network activity is an intrusion or normal, a multivariate correlation 1
analysis-based network anomaly-based intrusion detection system is proposed. The system …

Defending Web Applications against Malicious Traffic: Leveraging Machine Learning for Enhanced Security

G Logeswari, T Anitha, S Bose… - 2023 International …, 2023 - ieeexplore.ieee.org
As the frequency and complexity of cybersecurity threats continue to rise, it is imperative to
develop novel strategies for preventing and detecting malicious attacks. This paper …

Secure Translation from Sketch to Image Using an Unsupervised Generative Adversarial Network with Het for AI Based Images

M Poongodi, N Buvaneswari, S Bose… - 2023 International …, 2023 - ieeexplore.ieee.org
Sketch to image translation could be a useful tool in identifying person and generating real
life-like pictures out of sketches and drawings. Translation of sketches to image can come in …

MS3F: Maximizing Bandwidth and Data Transmission Performance in SUCCESS-HPON Architecture for WDM-PON Using AI Techniques

T Anitha, S Bose, N Maheswaran… - … on Advances in …, 2023 - ieeexplore.ieee.org
Recent advances in urban and access communication networks have enabled the use of
various technologies, with optical transmission mediums and Wavelength Division …

Designing a SDN-Based Intrusion Detection and Mitigation System Using Machine Learning Techniques

G Logeswari, S Bose, T Anitha - International Conference on Advanced …, 2022 - Springer
SDN is a network architectural approach that enables networks to be managed or designed
in an intelligent, centralized manner via software applications. SDN enables network experts …

[PDF][PDF] COMMUTATIVE DOMAINS OF TANGENTIAL, ARTIN, LOCAL FUNCTORS AND EXISTENCE METHODS

IK WIENER, C LINDEMANN - researchgate.net
Let ζ′ be an open, continuously symmetric, pseudo-minimal number. Recently, there has
been much interest in the computation of hyper-essentially Darboux functors. We show that …