Activity and anomaly detection in smart home: A survey

U Bakar, H Ghayvat, SF Hasanm… - Next generation sensors …, 2015 - Springer
Activity recognition is a popular research area with a number of applications, particularly in
the smart home environment. The unique features of smart home sensors have challenged …

A distributed IDS architecture model for Smart Home systems

M Gajewski, JM Batalla, G Mastorakis… - Cluster …, 2019 - Springer
The common use of smart devices encourages potential attackers to violate privacy.
Sometimes taking control of one device allows the attacker to obtain secret data (such as …

Hybrid intrusion detection method based on k-means and cnn for smart home

K Liu, Z Fan, M Liu, S Zhang - 2018 IEEE 8th annual …, 2018 - ieeexplore.ieee.org
This paper reviews the problem of instrusion detection for Smart Home and different
approach to detect instrusion. A hybrid instrusion detection method based on Convolutional …

PuLP: Scalable multi-objective multi-constraint partitioning for small-world networks

GM Slota, K Madduri… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
We present PuLP, a parallel and memory-efficient graph partitioning method specifically
designed to partition low-diameter networks with skewed degree distributions. Graph …

Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic

M Usman, V Muthukkumarasamy… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Despite the rapid advancements in consumer electronics, the data transmitted by sensing
devices in a smart home environment are still vulnerable to anomalies due to node faults …

Design of Home Appliance Control System in Smart Home based on WiFi IoT

Z Xiao, D Liu, D Cao, X Wang - 2018 IEEE 3rd Advanced …, 2018 - ieeexplore.ieee.org
Aiming at an issue of regional limitation of controlling and monitoring in home appliances, a
remote controlling and monitoring system of home appliances is designed, whose core MCU …

SmartGuard: an IoT-based intrusion detection system for smart homes

N Kesswani, B Agarwal - International journal of intelligent …, 2020 - inderscienceonline.com
With the help of sensor-enabled devices, we are able to achieve many tasks without human
intervention. The sensor enabled internet of things has made our lives simple. But at the …

[图书][B] Security for Multihop Wireless Networks

S Khan, JL Mauri, S Adibi - 2014 - api.taylorfrancis.com
First of all, we would like to express our gratitude to the publisher Taylor & Francis for giving
us full support in the timely completion of this book. We also thank all the authors for their …

Securing mobile agent based wireless sensor network applications on middleware

M Usman, V Muthukkumarasamy… - 2012 International …, 2012 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is an indispensable component of pervasive computing.
Mobile agents are used for several applications in WSNs such as data fusion, localization, re …

ATHAFI: Agile threat hunting and forensic investigation

R Puzis, P Zilberman, Y Elovici - arXiv preprint arXiv:2003.03663, 2020 - arxiv.org
Attackers rapidly change their attacks to evade detection. Even the most sophisticated
Intrusion Detection Systems that are based on artificial intelligence and advanced data …