Explainable AI for Human-Centric Ethical IoT Systems

PN Mahalle, RV Patil, N Dey, RG Crespo… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The current era witnesses the notable transition of society from an information-centric to a
human-centric one aiming at striking a balance between economic advancements and …

Detection and Mitigation of Vampire Attacks with Secure Routing in WSN using Weighted RNN and Optimal Path Selection

R Arunachalam - Computers & Security, 2024 - Elsevier
Abstract In Wireless Sensor Networks (WSNs), one of the most significant threats is vampire
attacks in sensor nodes. These attacks are marked by malicious behaviors within sensor …

Designing a vulnerability threat detection scanner with the use of machine learning models

O Ussatova, V Karyukin, A Zhumabekova… - Proceedings of the 13th …, 2023 - dl.acm.org
Vulnerabilities are a serious threat to operational systems, networks, and applications.
Identifying them in web services is crucial for organizations aiming to safeguard their …

Prevention of Security Attacks at Wireless Network Layers using Machine Learning Techniques

S Ramisetty, GSP Ghantasala… - 2024 11th International …, 2024 - ieeexplore.ieee.org
Wireless sensor networks have great potential for use in flood control, weather forecasting
systems, the military, and the healthcare industry. A WSN's nodes are connected to one …

Principal Component Analysis and Deep Learning-Based Traffic Anomaly Detection in WSN

V Shakya, J Choudhary… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) have advanced quickly due to the fast expansion of
wireless networks. Yet, because of their ease of use and versatility, security concerns have …

An Integrated Rule-Based and Machine Learning Technique for Efficient DoS Attack Detection in WSN

S Swami, P Singh, SS Chauhan - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are highly distributed, lightweight nodes, deployed in
large numbers to monitor systems. Because of the nature of wireless, there are various …

Misdirection Attack in Wireless Sensor Network Using Threshold Method

S Sharma, V Bharti - … Conference on Intelligent Systems Design and …, 2023 - Springer
Abstract Wireless Sensor Networks (WSNs) are constrained in terms of resources, have an
ad-hoc nature, and are susceptible to various network attacks. Due to their vulnerability to …

[图书][B] Intelligent Systems Design and Applications: Information and Network Security, Volume 3

A Abraham - 2023 - books.google.com
Welcome to the 23rd International Conference on Intelligent Systems Design and
Applications (ISDA 2023). ISDA 2023 was held in five different cities, namely Olten …

[PDF][PDF] ChatGPT and Cybersecurity: Risk Knocking the Door

MA Elsadig - researchgate.net
Numerous advancements in natural language processing (NLP) have been made possible
by the development of artificial intelligence (AI). In particular, the recent large growth in this …

[PDF][PDF] EXTREME GRADIENT BOOSTED MULTIFACTOR ENSEMBLE RELEVANCE VECTOR NODE CLASSIFICATION FOR ATTACK DETECTION IN WIRELESS IOT …

S Sangeetha, L Sudha - advancedengineeringscience.com
This paper propose an eXtreme Gradient Boosted Multifactor Ensemble Relevance Vector
Node Classification based Attack Detection (XGBMERVNC-AD) Model with the goal of …