[PDF][PDF] Intrusion detection in the Internet of Things using fusion of GRU-LSTM deep learning model
Cybersecurity threats are increasing rapidly as hackers use advanced techniques. As a
result, cybersecurity has now a significant factor in protecting organizational limits. Intrusion …
result, cybersecurity has now a significant factor in protecting organizational limits. Intrusion …
Optimization of network topology robustness in IoTs: A systematic review
Abstract Internet of Things (IoT) has emerged as one of the most promising technologies of
the modern era, enabling connectivity between devices and systems for efficient data …
the modern era, enabling connectivity between devices and systems for efficient data …
[Retracted] Cyber Security against Intrusion Detection Using Ensemble‐Based Approaches
MN Alatawi, N Alsubaie, H Ullah Khan… - Security and …, 2023 - Wiley Online Library
The attacks of cyber are rapidly increasing due to advanced techniques applied by hackers.
Furthermore, cyber security is demanding day by day, as cybercriminals are performing …
Furthermore, cyber security is demanding day by day, as cybercriminals are performing …
Ambient intelligence (AmI)
TCT Chen - … (XAmI) Explainable Artificial Intelligence Applications in …, 2024 - Springer
This chapter begins by defining ambient intelligence (AmI). The chronology of the
emergence of the most widely used AmI technologies is then provided. Through reviewing …
emergence of the most widely used AmI technologies is then provided. Through reviewing …
Neuro-evolutionary framework for design optimization of two-phase transducer with genetic algorithms
Multilayer piezocomposite transducers are widely used in many applications where broad
bandwidth is required for tracking and detection purposes. However, it is difficult to operate …
bandwidth is required for tracking and detection purposes. However, it is difficult to operate …
Malware containment with immediate response in IoT networks: An optimal control approach
The exponential growth of Internet of Things (IoT) devices has triggered a substantial
increase in cyber-attacks targeting these systems. Recent statistics show a surge of over 100 …
increase in cyber-attacks targeting these systems. Recent statistics show a surge of over 100 …
A Self-Adaptive Robustness Optimization Method With Evolutionary Multi-Agent for IoT Topology
Topology robustness is critical to the connectivity and lifetime of large-scale Internet-of-
Things (IoT) applications. To improve robustness while reducing the execution cost, the …
Things (IoT) applications. To improve robustness while reducing the execution cost, the …
CARE: an efficient modelling for topology robustness of an IoT based healthcare network using Go-GA
The proliferation of the Internet of Things (IoT) in healthcare necessitates networks that are
robust against potential node or link failures to ensure uninterrupted patient care. This …
robust against potential node or link failures to ensure uninterrupted patient care. This …
Enhancing Intrusion Tolerance of Clustered Wireless Sensor Networks using a Double-Stage Scale-Free Topology Evolution Model
Constructing a scale-free topology is an effective method to improve the fault tolerance of
wireless sensor networks (WSNs). However, when deploying WSNs in high-value …
wireless sensor networks (WSNs). However, when deploying WSNs in high-value …
Topology optimization of thermally activated building system in high-rise building
The building sector accounts for nearly 1/3 of global energy end-use and associated carbon
emissions. Fulfilling buildings' thermal demand in an efficient way is critical for …
emissions. Fulfilling buildings' thermal demand in an efficient way is critical for …