Search
Now showing items 1-9 of 9
Dynamic collaboration of centralized & Edge processing for coordinated data management in an IoT paradigm.
(IEEE, 2018-05)
Over the past decade, much focus in the area of Technology has deviated towards two relatively new areas; "The Internet of Things" and "Machine Learning". Although completely separate technologies, they have one major ...
A governance architecture for self-adaption & control in IoT applications.
(IEEE, 2018-06-25)
The “Internet of Things” has become a reality with
projections of 28 billion connected devices by 2021. Much
R&D is currently focused on creating methods to efficiently
handle an influx of data. Flow based programming, ...
An architecture for intelligent data processing on IoT edge devices.
(IEEE, 2018-05-17)
As the Internet of Things edges closer to
mainstream adoption, with it comes an exponential rise in data
transmission across the current Internet architecture.
Capturing and analyzing this data will lead to a wealth ...
A flow based architecture for efficient distribution of vehicular information in smart cities.
(IEEE, 2019-12-23)
The Introduction of the Internet of Things has made the
vision of “Smart Cities” a very reachable goal. Aggregating data
from a wealth of sensors throughout a city, with the aim of
improving quality of life for its ...
Bidirectional LSTM autoencoder for sequence based anomaly detection in cyber security.
(United Kingdom Simulation Society, 2019)
Cyber-security is concerned with protecting information, a vital asset in today’s world. The volume of data that is
generated can be usefully analyzed when cyber-security systems are effectively implemented with the aid ...
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)
Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ...
Host based intrusion detection system with combined CNN/RNN model.
(Springer International Publishing, 2018)
Cyber security has become one of the most challenging as-
pects of modern world digital technology and it has become imperative
to minimize and possibly avoid the impact of cybercrimes. Host based
intrusion detection ...
An analysis of alterations to the SCTP RTO calculation mechanism for WLAN environments
(Springer, 2008-01)
As a connection oriented transport layer protocol the Stream Control
Transmission Protocol (SCTP) inherits many of the features of the Transmission
Control Protocol (TCP) including the mechanism by which Retransmission ...
Intelligent monitoring of IoT devices using neural networks
(IEEE, 2021-03-29)
The Internet of Things (IoT) has seen expeditious growth in recent times with 7 billion connected devices in 2020, thus leading to the vital importance of real-time monitoring of IoT devices. Through this paper, we demonstrate ...