[HTML][HTML] A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

Anomaly detection in autonomous electric vehicles using AI techniques: A comprehensive survey

P Dixit, P Bhattacharya, S Tanwar, R Gupta - Expert Systems, 2022 - Wiley Online Library
The next wave in smart transportation is directed towards the design of renewable energy
sources that can fuel automobile sector to shift towards the autonomous electric vehicles …

A taxonomy of AI techniques for 6G communication networks

K Sheth, K Patel, H Shah, S Tanwar, R Gupta… - Computer …, 2020 - Elsevier
With 6G flagship program launched by the University of Oulu, Finland, for full future
adaptation of 6G by 2030, many institutes worldwide have started to explore various issues …

An edge computing based anomaly detection method in IoT industrial sustainability

X Yu, X Yang, Q Tan, C Shan, Z Lv - Applied Soft Computing, 2022 - Elsevier
In recent years, the evolving Internet of Things (IoT) technology has been widely used in
various industrial scenarios, whereby massive sensor data involving both normal data and …

Evaluation of metaverse tools based on privacy model using fuzzy MCDM approach

NA Husin, AA Abdulsaeed, YR Muhsen… - … Integrated Sciences and …, 2023 - Springer
The issue of uncertainty in decision modelling for control engineering tools that support
industrial cyber-physical metaverse smart manufacturing systems (ICPMSMSs) can be …

Leveraging AI‐enabled 6G‐driven IoT for sustainable smart cities

B Gera, YS Raghuvanshi, O Rawlley… - International Journal …, 2023 - Wiley Online Library
Many scholastic researches have begun around the globe about the competitive
technological interventions like 5G communication networks and its challenges. The …

Edge server placement problem in multi-access edge computing environment: models, techniques, and applications

B Bahrami, MR Khayyambashi, S Mirjalili - Cluster Computing, 2023 - Springer
Abstract Multi-Access Edge Computing (MEC) is known as a promising communication
paradigm that enables IoT and 5G scenarios by using edge servers located in the proximity …

Digital twin-assisted intelligent anomaly detection system for Internet of Things

B Bolat-Akça, E Bozkaya-Aras - Ad Hoc Networks, 2024 - Elsevier
The proliferation of Internet of Things (IoT) devices within the cyber–physical infrastructure
has raised privacy and security concerns. This is because processing large amounts of data …

Network traffic prediction in industrial Internet of Things backbone networks: A multitask learning mechanism

L Nie, X Wang, S Wang, Z Ning… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT), as a common industrial application of Internet of Things,
has been widely deployed in recent years. End-to-end network traffic is an essential …

Privacy-preserving anomaly detection in cloud manufacturing via federated transformer

S Ma, J Nie, J Kang, L Lyu, RW Liu… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
With the rapid development of cloud manufacturing, industrial production with edge
computing as the core architecture has been greatly developed. However, edge devices …