4.6 Article

Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network

Related references

Note: Only part of the references are listed.
Review Engineering, Civil

A review on cybersecurity in railways

Ravdeep Kour et al.

Summary: Digitalization is transforming the railway industry globally, but it also brings increased cybersecurity risks. The current cybersecurity research in the railway industry mainly focuses on conceptual aspects and lacks the application of advanced technologies like artificial intelligence.

PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART F-JOURNAL OF RAIL AND RAPID TRANSIT (2023)

Article Computer Science, Interdisciplinary Applications

Honey Badger Algorithm: New metaheuristic algorithm for solving optimization problems

Fatma A. Hashim et al.

Summary: This paper introduces a new metaheuristic optimization algorithm called Honey Badger Algorithm (HBA), inspired by the intelligent foraging behavior of honey badgers, to develop an efficient search strategy for solving optimization problems. Experimental results demonstrate the effectiveness and superiority of HBA in solving optimization problems with complex search-space.

MATHEMATICS AND COMPUTERS IN SIMULATION (2022)

Article Chemistry, Analytical

An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs

Gaoyuan Liu et al.

Summary: This paper proposes a WSN intelligent intrusion detection model based on edge computing, which combines the k-Nearest Neighbor algorithm and arithmetic optimization algorithm to detect intrusions in the WSN, achieving high accuracy and performance in experimental tests.

SENSORS (2022)

Article Computer Science, Information Systems

An enhanced Grey Wolf Optimizer based Particle Swarm Optimizer for intrusion detection system in wireless sensor networks

Mohammed Otair et al.

Summary: The intrusion detection system is a method for detecting system attacks. Researchers proposed a technique that combines Grey Wolf Optimization and Particle Swarm Optimization to solve the issue of local optimal solution in intrusion detection. The performance of the technique was verified using k-means and SVM algorithms.

WIRELESS NETWORKS (2022)

Article Computer Science, Information Systems

Tasmanian Devil Optimization: A New Bio-Inspired Optimization Algorithm for Solving Optimization Algorithm

Mohammad Dehghani et al.

Summary: This paper presents a new bio-inspired metaheuristic algorithm called Tasmanian Devil Optimization (TDO), which mimics the feeding behavior of Tasmanian devils. The TDO algorithm demonstrates high ability and competitiveness in optimization problems.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Intrusion Detection Technique in Wireless Sensor Network using Grid Search Random Forest with Boruta Feature Selection Algorithm

Sridevi Subbiah et al.

Summary: This article introduces an intrusion detection system for wireless sensor networks and proposes a new framework that improves accuracy. By utilizing Boruta feature selection with grid search random forest algorithm, the framework performs well in detecting attacks and outperforms other existing algorithms.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2022)

Article Computer Science, Artificial Intelligence

A novel intelligent technique for energy management in smart home using internet of things

P. Rajesh et al.

Summary: This manuscript presents a hybrid method for energy management system (EMS) in smart homes using internet of things (IoT) that combines Sailfish Optimizer (SFO) and Adaptive Neuro-Fuzzy Interference System (ANFIS) to optimize power and resource management in the distribution system (DS).

APPLIED SOFT COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system

Vinayakumar Ravi et al.

Summary: This work proposes an end-to-end model for network attack detection and classification using deep learning-based recurrent models. The model extracts features from the hidden layers of recurrent models and uses a feature selection approach to identify optimal features. Experimental results show that the proposed method outperforms existing methods and commonly used machine learning models.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Information Systems

WOGRU-IDS - An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks

Kadiyala Ramana et al.

Summary: The study proposed a unique Whale Optimized Gate Recurrent Unit (WOGRU) Intrusion Detection System for WSN-IoT networks to effectively identify various attacks, using whale algorithm to tune hyperparameters for low computational overhead and great performance, and validated the effectiveness of the framework.

COMPUTER COMMUNICATIONS (2022)

Article Telecommunications

Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions

Djallel Eddine Boubiche et al.

Summary: The vulnerability of wireless sensor networks to attacks mainly stems from data transmission over the air, lack of tamper-proof sensor nodes, and inability for human intervention in dealing with network compromises. Lightweight and efficient security protocols must be researched, while respecting the specific constraints of the sensor nodes.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Computer Science, Artificial Intelligence

Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks

Mukaram Safaldin et al.

Summary: An enhanced intrusion detection system using the modified binary grey wolf optimizer with support vector machine is proposed in this paper. The system utilizes 3, 5, and 7 wolves to find the optimal number of wolves for intrusion detection in WSN environments, aiming to increase detection accuracy and speed.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Artificial Intelligence

A Gaussian process regression approach to predict the k -barrier coverage probability for intrusion detection in wireless sensor networks

Abhilash Singh et al.

Summary: This paper proposes three methods based on machine learning approach using GPR model for fast intrusion detection and prevention in Wireless Sensor Networks. By selecting potential features like number of nodes, sensing range, velocity ratio, etc., and extracting features using analytical approach, accurate prediction of k-barrier coverage probability is achieved. The proposed method outperforms other benchmark schemes with higher accuracy.

EXPERT SYSTEMS WITH APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

Structure-preserving NPR framework for image abstraction and stylization

M. P. Pavan Kumar et al.

Summary: This work presents a structure-preserving non-photorealistic rendering framework that distills prominent structural features, dominant edges, and other essential elements while suppressing unnecessary details. The framework enhances image properties effectively and preserves structural features by integrating a sequence of NPR image filters.

JOURNAL OF SUPERCOMPUTING (2021)

Article Telecommunications

A Novel QoS Based Secure Unequal Clustering Protocol with Intrusion Detection System in Wireless Sensor Networks

M. Maheswari et al.

Summary: This paper introduces a novel secure unequal clustering protocol with intrusion detection technique to optimize the energy efficiency, network lifetime, and security of WSN. The proposed model utilizes adaptive neuro fuzzy based clustering technique to select tentative cluster heads, followed by deer hunting optimization algorithm to select optimal cluster heads. Additionally, a cluster maintenance phase is employed for load balancing, and an intrusion detection system based on deep belief network is utilized for enhancing security.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Automation & Control Systems

A novel density estimation based intrusion detection technique with Pearson's divergence for Wireless Sensor Networks

Shashank Gavel et al.

Summary: The proposed technique utilizes a combination of multi-varying kernel density estimation and distributed computing to detect intrusive attacks caused by compromised nodes in the network, providing efficient performance through the calculation of global probability density functions and effective detection within the network, with an approximation of PE divergence carried out using different techniques. Comparing results obtained using PE divergence and an entropy-based method helps to assess the robustness of the approach in estimating intrusion attacks accurately.

ISA TRANSACTIONS (2021)

Article Environmental Sciences

Self-Attention-Based Conditional Variational Auto-Encoder Generative Adversarial Networks for Hyperspectral Classification

Zhitao Chen et al.

Summary: The article introduces a Self-Attention-Based Conditional Variational Autoencoder Generative Adversarial Network (SACVAEGAN) that aims to improve hyperspectral image classification performance by generating enhanced virtual samples, focusing on global information, and incorporating the WGAN-GP loss function to enhance model stability. Experimental results and comparisons with state-of-the-art methods demonstrate the significant advantages of SACVAEGAN in accuracy.

REMOTE SENSING (2021)

Article Computer Science, Software Engineering

Efficient monitoring for intrusion detection in wireless sensor networks

Takoua Abdellatif et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Artificial Intelligence

Wireless sensor network intrusion detection system based on MK-ELM

Wenjie Zhang et al.

SOFT COMPUTING (2020)

Article Computer Science, Artificial Intelligence

An optimized collaborative intrusion detection system for wireless sensor networks

Shaimaa Ahmed Elsaid et al.

SOFT COMPUTING (2020)

Article Telecommunications

Neuro-Fuzzy Based Intrusion Detection System for Wireless Sensor Network

Somnath Sinha et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Information Systems

SLGBM: An Intrusion Detection Mechanism for Wireless Sensor Networks in Smart Environments

Shuai Jiang et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

A Collaborative Security Framework for Software-Defined Wireless Sensor Networks

Christian Miranda et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Review Computer Science, Information Systems

Review of Cyber-Physical System in Healthcare

Shah Ahsanul Haque et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2014)

Article Computer Science, Information Systems

Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks

Tianbo Lu et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2014)