Intrusion detection using optimized ensemble classification in fog computing paradigm

MP Ramkumar, T Daniya, PM Paul… - Knowledge-Based …, 2022 - Elsevier
Fog computing is a framework, which expands services of the cloud to network for
addressing inherent issues of the cloud. Intrusion Detection Systems (IDSs) represent a …

Machine Learning Methods of IoT Security and Future Application: Machine Learning Methods of IoT Security and Future Application

A Ali, S Naeem, S Anam, MM Ahmed - Proceedings of the Pakistan …, 2022 - ppaspk.org
One of the technologies that are now expanding rapidly is called the Internet of Things (IoT).
It is a technology that enables billions of smart devices or things, collectively referred to as …

Federated-learning-based decision support for industrial internet of things (iiot)-based printed circuit board assembly process

YP Tsang, CH Wu, WH Ip, CKM Lee - Journal of Grid Computing, 2022 - Springer
Solder paste printing (SPP) is one of the critical processes for the printed circuit board
assembly to reliably apply the solder paste on raw PCBs for the component placement …

The use of serverless processing in web application development

R Banaszak, A Kobusinska - International Computer Symposium, 2022 - Springer
This paper analyses the applicability of serverless processing in the web application field.
We discuss whether the serverless approach fulfils the web applications' requirements, and …

A Hybrid PCA-MAO Based LSTM Model for Intrusion Detection in IoT Environments

H Karamollaoğlu, İ Yücedağ, İA Doğru - 2022 - researchsquare.com
With the rapid advances in Internet of Things (IoT) technologies, the number of smart objects
connected to IoT networks is increasing day by day. Parallel to this exponential growth …

[PDF][PDF] Chaotic Metaheuristics with Multi-Spiking Neural Network Based Cloud Intrusion Detection

M Yamin, S Bajaba, ZM AlKubaisy - Comput. Mater. Contin, 2022 - cdn.techscience.cn
Cloud Computing (CC) provides data storage options as well as computing services to its
users through the Internet. On the other hand, cloud users are concerned about security and …

Credit Card Fraud Detection Using Deep Learning Approach (LSTM) Under IoT Environment

B Tayeb, A Amine, HM Reda… - International Journal of …, 2022 - igi-global.com
Online payment has mainly relied since 2008 on having a rechargeable cash card that
remains the most popular form of payment for e-commerce transactions. Using this card is …

BSA-SGRU-A Novel Deep Learning Framework for Alleviate the Multiple Attacks in IoT-Cloud Environment

PJ Kumar, N Subbu - Journal of Computational and …, 2022 - ojs.bonviewpress.com
Abstract The Internet of Things (IoT) has emanated as an innovative technology that grants
users to establish connections to external servers located in the cloud and the uninterrupted …