Privacy and security enhancement of smart cities using hybrid deep learning-enabled blockchain

JB Awotunde, T Gaber, LVN Prasad… - … Computing: Practice and …, 2023 - scpe.org
The emergence of the Internet of Things (IoT) accelerated the implementation of various
smart city applications and initiatives. The rapid adoption of IoT-powered smart cities is …

Dl-ads: Improved grey wolf optimization enabled ae-lstm technique for efficient network anomaly detection in internet of thing edge computing

J Manokaran, G Vairavel - IEEE Access, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) technology has begun to proliferate in recent years, which
simultaneously increases the number of attacks. Owing to the massive volume and multi …

Unsupervised Machine Learning for Cybersecurity Anomaly Detection in Traditional and Software-Defined Networking Environments

C Rookard, A Khojandi - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
Cybersecurity has become a field of increasing importance within the past years, with the
National Academy of Engineering most recently designating securing cyberspace as one of …

An automated approach for fibroblast cell confluency characterisation and sample handling using aiot for bio-research and bio-manufacturing

M Shamhan, AS Idris, SF Toha, MF Daud… - Cogent …, 2023 - Taylor & Francis
Current methods used in cell culture monitoring, characterisation and handling are manual,
time consuming and highly dependent on subjective observations made by human …

Subspace‐Based Anomaly Detection for Large‐Scale Campus Network Traffic

X Zhao, Q Wu - Journal of Applied Mathematics, 2023 - Wiley Online Library
With the continuous development of information technology and the continuous progress of
traffic bandwidth, the types and methods of network attacks have become more complex …

[PDF][PDF] A deep learning algorithm-based visual strategy intervention study for children with autism spectrum disorders–extraction and detection of children's behavioral …

Y Lin - European Review for Medical & Pharmacological …, 2023 - researchgate.net
OBJECTIVE: Autism spectrum disorder is a group of neurodevelopmental disorders. The
disease's etiology is unclear, and there is no specific drug treatment for the core symptoms …

TwoDCA: A 2-Dimensional Dendritic Cell Algorithm with Dynamic Cell Migration

J Greensmith, L Yang - 2022 IEEE Congress on Evolutionary …, 2022 - ieeexplore.ieee.org
The Dendritic Cell Algorithm (DCA) is a multi-agent artificial immune system designed for
anomaly detection. The algorithm is composed of artificial dendritic cell agents that process …

Distributed denial of service attack detection using machine learning classifiers

R Gautam, R Padmavathy - International Journal of Ad Hoc …, 2024 - inderscienceonline.com
Online services risk distributed denial of service attacks due to their availability. These
attacks overload system resources and make them unusable by legitimate users. This study …

A Comparative Analysis of Snort and Dendritic Cell Algorithm in Intrusion Detection Systems

CA Winanto, P Putra, DP Rini, O Arsalan… - 2024 11th …, 2024 - ieeexplore.ieee.org
In this study, we compare the performance of snort and dendritic cell algorithm (DCA) as
intrusion detection systems (IDS) based on several key metrics. The evaluation results show …

Dendritic Cell Algorithm with Bayesian Optimization Hyperband for Signal Fusion.

D Zhang, Y Zhang, Y Liang - Computers, Materials & …, 2023 - search.ebscohost.com
The dendritic cell algorithm (DCA) is an excellent prototype for develo** Machine
Learning inspired by the function of the powerful natural immune system. Too many …