Human activity recognition: trends and challenges

D Thakur, A Pal - Activity Recognition and Prediction for Smart IoT …, 2024 - Springer
Abstract Internet of Things (IoT) usage has increased due to advancements in information
and communication systems. IoT technologies in contemporary healthcare applications …

[HTML][HTML] Scout: Security by computing outliers on activity logs

M Ianni, E Masciari - Computers & Security, 2023 - Elsevier
The current increase in cybercrime is demanding more effective and efficient data
exploration and analysis solutions that can help analysts to detect cyberattacks. However …

DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things

J Chen, H Xiao, Y Zheng, MM Hassan, M Ianni… - Internet of Things, 2023 - Elsevier
Kerberos is a widely used authentication protocol that protects distributed services on the
Internet of Things (IoT) and big data. In a distributed scenario, entities must prove their …

Physics-aware targeted attacks against maritime industrial control systems

G Longo, F Lupia, A Pugliese, E Russo - Journal of Information Security and …, 2024 - Elsevier
The advancement of the maritime industry towards technologically integrated and
automated systems has significantly increased the complexity of onboard Industrial Control …

A systematic literature review on past attack analysis on industrial control systems

S Goel - Transactions on Emerging Telecommunications …, 2024 - Wiley Online Library
Industrial control systems are used to automate the monitoring and control of physical
processes in large‐scale industries and critical infrastructure such as power plants, chemical …

Survey on identification and prediction of security threats using various deep learning models on software testing

RA Khan - Multimedia Tools and Applications, 2024 - Springer
In this research, authors give a literature analysis of the methods used to detect and
anticipate security risks in software testing by using a number of deep learning models. The …

Industrial control system design of optimized fopid controller with anomaly detection based on walrus optimization and Bi-LSTM

K Chandran, PK Shukla, TA Ahanger… - Forschung im …, 2025 - Springer
Industrial control systems (ICSs) play a role in many forms of social infrastructure, and they
are essential for the accomplishment of control goals and security maintenance …

A Comprehensive Review of Deep Learning for Activity Recognition

D Thakur, G Fortino - Activity Recognition and Prediction for Smart IoT …, 2024 - Springer
Abstract Human Activity Recognition (HAR) is an important field in smart healthcare that has
attracted remarkable attention from researchers. Several HAR systems are existing in the …

An intrusion detection system empowered by deep learning algorithms

W Tang, D Li, W Fan, T Liu, M Chen… - 2023 IEEE Intl Conf on …, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) faces significant challenges in managing the
increasing volume of network traffic, which calls for robust cybersecurity measures …

Multi-User Activity Monitoring Based on Contactless Sensing

Q Li, B Lal, R Gravina - Activity Recognition and Prediction for Smart IoT …, 2024 - Springer
Multi-user activities are essential to human communication and significantly shape social
interactions, behaviors, and relationships. Understanding these activities is crucial for …