Multiscale monitoring using machine learning methods: New methodology and an industrial application to a photovoltaic system

H Chaouch, S Charfeddine, S Ben Aoun, H Jerbi… - Mathematics, 2022 - mdpi.com
In this study, a multiscale monitoring method for nonlinear processes was developed. We
introduced a machine learning tool for fault detection and isolation based on the kernel …

A survey on security threats and network vulnerabilities in Internet of Things

HK Saini, M Poriye, N Goyal - Big Data Analytics in Intelligent IoT and …, 2023 - Springer
Abstract Internet of Things (IoT) is a group of physical objects like sensors and actuators etc.
connected through the network for dynamic exchange of information for augmenting the …

Self-supervised video representation and temporally adaptive attention for audio-visual event localization

Y Ran, H Tang, B Li, G Wang - Applied Sciences, 2022 - mdpi.com
Localizing the audio-visual events in video requires a combined judgment of visual and
audio components. To integrate multimodal information, existing methods modeled the cross …

Review on machine learning based intrusion detection for manet security

W Bouassaba, A Nabou… - 2022 9th international …, 2022 - ieeexplore.ieee.org
Recently, the mobile ad hoc network (MANET) has enjoyed a great reputation thanks to its
advantages such as: high performance, no expensive infrastructure to install, use of …

Design of intrusion detection and prevention model using COOT optimization and hybrid LSTM-KNN classifier for MANET

G Madhu - EAI Endorsed Transactions on Scalable Information …, 2022 - eudl.eu
INTRODUCTION: MANET is an emerging technology that has gained traction in a variety of
applications due to its ability to analyze large amounts of data in a short period of time. Thus …

Machine Learning for Intrusion Detection in Ad-hoc Networks: Wormhole and Blackhole Attacks Case

AT Kouanou, TF Fonzin, FM Zanga… - Cloud Computing and …, 2024 - ojs.wiserpub.com
This paper addresses the security concerns associated with Mobile Ad-hoc Networks
(MANET) and proposes a new method for detecting and preventing attacks using machine …

[PDF][PDF] Proposed Naïve Bayes-Genetic algorithm to detect black hole attacks in MANETs.

RM Hadi, LH Rahef - Journal of the College of Basic Education, 2023 - iasj.net
The threats and attacks on mobile ad hoc networks (MANETs) are significant, making it
difficult for traditional security systems to provide complete protection. Therefore, an efficient …

Deep Learning based framework for dynamic Detection and Mitigation of ARP Spoofing attacks

H Puram, RS Kumar… - 2023 14th International …, 2023 - ieeexplore.ieee.org
Address Resolution Protocol (ARP) is a protocol that links the IP address of a network node
to the Media Access Control (MAC) address of another node for communication. An attack …

Exploring cyber security threats in smart city infrastructure with prospective solution

R Shah, S Kadia, R Shah, K Shah… - AIP Conference …, 2023 - pubs.aip.org
Smart cities are a mixture of using different Internet of Things (IoT) devices and artificial
intelligence techniques to develop a better environment for living. The paper's primary focus …

[PDF][PDF] Performance Analysis of Prophet Routing Protocol in Delay Tolerant Network by using Machine Learning Models

BS Kumar, S Vishnubhatla, MB Chevuru… - International Journal of …, 2023 - researchgate.net
Tolerant Networking comes under the category of networks that works without infrastructure
wireless networks. DTN is one type of computer network that provides solutions for several …