4.6 Article

Anomaly Detection in Fog Computing Architectures Using Custom Tab Transformer for Internet of Things

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure

Sangjukta Das et al.

Summary: The exponential growth of IoT technologies has increased the demand for data security. This article proposes a novel CP-ABE technique based on elliptic curve cryptography, which achieves fine-grained access control and improves efficiency by introducing multiple attribute authorities and outsourcing the decryption process.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

Human Immune-Based Intrusion Detection and Prevention System for Fog Computing

Farouq Aliyu et al.

Summary: In this paper, a lightweight intrusion detection system (IDS) for fog computing is proposed, which achieves low resource overhead and reduces energy consumption by distributing the functions among fog nodes and the cloud.

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2022)

Article Chemistry, Analytical

Visualizing Street Pavement Anomalies through Fog Computing V2I Networks and Machine Learning

Rogelio Bustamante-Bello et al.

Summary: Analyzing data related to city streets can improve decision-making on public spending. This study proposes a solution that uses vehicle sensors and fog computing to detect anomalies on streets, classifying and evaluating them using machine learning algorithms.

SENSORS (2022)

Article Telecommunications

Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks

Yasmine Labiod et al.

Summary: This paper proposes a new distributed and lightweight intrusion detection system for IoT devices, which utilizes anomaly detection techniques to accurately identify various types of attacks. The system operates within a fog architecture and demonstrates high detection rate and low false alarm rate.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Software Engineering

A Novel Technique for Accelerating Live Migration in Cloud Computing

Ambika Gupta et al.

Summary: This paper explores the application of cloud computing in scientific areas and the issues of virtual machine migration. It proposes a reliable and advanced live migration optimization technique that improves the performance of cloud computing environments by reducing migration time.

AUTOMATED SOFTWARE ENGINEERING (2022)

Article Computer Science, Hardware & Architecture

Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments

Cristiano Antonio de Souza et al.

Summary: Due to resource limitations in Internet of Things devices, security is often overlooked. This study proposes a two-step approach for intrusion detection and identification, which includes traffic analysis and ensemble methods. The proposed approach is evaluated on multiple intrusion datasets, demonstrating its robustness.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Hardware & Architecture

A Novel Hybrid Encryption Method to Secure Healthcare Data in IoT-enabled Healthcare Infrastructure

Sangjukta Das et al.

Summary: Nowadays, IoT plays a significant role in healthcare management, but security and privacy issues are major concerns. This paper proposes a novel encryption scheme that improves the security of healthcare data by incorporating both symmetric and asymmetric encryption techniques, and ensures data integrity using elliptic curve-based digital signature.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Engineering, Civil

Achieving a Decentralized and Secure Cab Sharing System Using Blockchain Technology

Suyel Namasudra et al.

Summary: The cab-sharing system utilizes blockchain technology to provide a decentralized and secure ride-sharing service without the need for trusted third parties. It improves travel efficiency and security, reduces costs, and addresses privacy concerns, making it an efficient solution.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Hyperspectral anomaly detection via memory-augmented autoencoders

Zhe Zhao et al.

Summary: The autoencoder (AE) based method has become essential in hyperspectral anomaly detection. However, due to the strong generalised capacity of AE, abnormal samples are often reconstructed along with the normal background samples. To effectively separate anomalies from the background, a memory-augmented autoencoder (MAENet) is proposed. The MAENet reduces the AE capability for abnormal sample reconstruction while maintaining the background reconstruction performance.

CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY (2022)

Article Computer Science, Artificial Intelligence

Deep image retrieval using artificial neural network interpolation and indexing based on similarity measurement

Faiyaz Ahmad

Summary: In content-based image retrieval, image signatures play a critical role in representing visual characteristics and facilitating appropriate indexing and retrieval of comparable results. Previous methods using spatial information to differentiate image categories faced challenges in image detection. This study proposes a new technique called CBIR-SMANN to address this issue and achieve superior performance in similarity measurement and retrieval.

CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY (2022)

Article Computer Science, Information Systems

Maintainable stochastic communication network reliability within tolerable packet error rate

Suchi Kumari et al.

Summary: The paper proposes fast solutions to data communication problems within constraints such as permissible error rate, time limit, and maintenance budget constraints. The system reliability and performance of the proposed approaches are evaluated using minimal paths, with the proposed approaches observed to be faster in terms of computation time compared to existing methods.

COMPUTER COMMUNICATIONS (2021)

Article Automation & Control Systems

Variational LSTM Enhanced Anomaly Detection for Industrial Big Data

Xiaokang Zhou et al.

Summary: The article introduces a VLSTM model to address imbalance and high-dimension issues in industrial big data, which significantly improves accuracy and reduces false positives in anomaly detection.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset

Vikash Kumar et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)

Article Computer Science, Theory & Methods

Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset

Sydney M. Kasongo et al.

JOURNAL OF BIG DATA (2020)

Article Computer Science, Information Systems

Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes

Jesus Pacheco et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things

Nour Moustafa et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Artificial Intelligence

A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization

Ilyas Benmessahel et al.

EVOLUTIONARY INTELLIGENCE (2019)

Article Computer Science, Information Systems

Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks

Nour Moustafa et al.

IEEE TRANSACTIONS ON BIG DATA (2019)

Article Computer Science, Information Systems

Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations

Nataliia Neshenko et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Artificial Intelligence

Semi-supervised learning based distributed attack detection framework for IoT

Shailendra Rathore et al.

APPLIED SOFT COMPUTING (2018)

Article Computer Science, Theory & Methods

Distributed attack detection scheme using deep learning approach for Internet of Things

Abebe Abeshu Diro et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges

Carla Mouradian et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Information Systems

Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things

S. Prabavathy et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2018)

Proceedings Paper Computer Science, Theory & Methods

Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning

Abhishek Verma et al.

6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (2018)

Review Computer Science, Information Systems

Intrusion detection systems for IoT-based smart environments: a survey

Mohamed Faisal Elrawy et al.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering

Lingjuan Lyu et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

Data Mining for Internet of Things: A Survey

Chun-Wei Tsai et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Anomaly Detection in Wireless Sensor Networks in a Non-Stationary Environment

Colin O'Reilly et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Theory & Methods

Internet of Things (IoT): A vision, architectural elements, and future directions

Jayavardhana Gubbi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Computer Science, Artificial Intelligence

Finding key attribute subset in dataset for outlier detection

Peng Yang et al.

KNOWLEDGE-BASED SYSTEMS (2011)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)