[HTML][HTML] XGBoost for imbalanced multiclass classification-based industrial internet of things intrusion detection systems

TTH Le, YE Oktian, H Kim - Sustainability, 2022 - mdpi.com
The Industrial Internet of Things (IIoT) has advanced digital technology and the fastest
interconnection, which creates opportunities to substantially grow industrial businesses …

[HTML][HTML] Monitoring performance metrics in low-power wireless systems

F Graf, T Watteyne, M Villnow - ICT Express, 2024 - Elsevier
Abstract Application Performance Monitoring (APM) is key for ensuring computer systems
perform well. While most APM tools target servers and networking infrastructure, here we …

[HTML][HTML] Maintenance 5.0: towards a worker-in-the-loop framework for resilient smart manufacturing

A Cortes-Leal, C Cardenas, C Del-Valle-Soto - Applied Sciences, 2022 - mdpi.com
Due to the global uncertainty caused by social problems such as COVID-19 and the war in
Ukraine, companies have opted for the use of emerging technologies, to produce more with …

A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammers

ZSM Al-Husseini, HK Chaiel, A Meddeb… - … Oriented Computing and …, 2024 - Springer
This review article explores jamming attacks, a critical security threat disrupting
communication in wireless sensor networks (WSNs). We begin by introducing WSNs and …

[HTML][HTML] An integrated testbed for power system cyber-physical operations training

M Chamana, R Bhatta, K Schmitt, R Shrestha… - Applied Sciences, 2023 - mdpi.com
The increased adoption of information and communication technology for smart grid
applications will require innovative cyber–physical system (CPS) testbeds to support …

Multi-channel assessment policies for energy-efficient data transmission in wireless underground sensor networks

R Soundararajan, PM Stanislaus, SG Ramasamy… - energies, 2023 - mdpi.com
Wireless Underground Sensor Networks (WUGSNs) transmit data collected from
underground objects such as water substances, oil substances, soil contents, and others. In …

Interleaved honeypot-framing model with secure mac policies for wireless sensor networks

R Soundararajan, M Rajagopal, A Muthuramalingam… - Sensors, 2022 - mdpi.com
The Wireless Medium Access Control (WMAC) protocol functions by handling various data
frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC …

Enhancing Networked Control System Resilience to TCP/IP Protocol DoS Attacks: Performance Analysis and Intelligent Controller Design

X Cai, Y Sun, K Shi, X **e, YC Soh… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This study examines denial-of-service (DoS) attacks on networked control systems (NCSs)
caused by TCP/IP protocol vulnerabilities. It conducts a comprehensive analysis of hacker …

[PDF][PDF] Application of the learning set for the detection of jamming attacks in 5g mobile networks

BM Kouassi, V Monsan, AB Ballo… - International Journal of …, 2023 - academia.edu
5G mobile networks, requiring an effective detection mechanism to ensure network security.
This study focused on finding effective methods for detecting these attacks using machine …

Multiobjective Gannet Dung Beetle Optimization for routing in IoT-WSN

S Sangeetha, K Kanagaraj, N Prasath… - Peer-to-Peer Networking …, 2024 - Springer
The best route identification is important in Wireless Sensor Network (WSN) and the Internet
of Things (IoT) for the seamless functioning of connected smart devices. The basic problems …