2021
DOI: 10.1109/access.2021.3128701
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Deep Learning Approach for Replay and DDoS Attack Detection in a Smart City

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(15 citation statements)
references
References 47 publications
0
15
0
Order By: Relevance
“…The risk value of the node is calculated based on successive rate and risk probability. Initially, the nodes (17) From the above equation, M denotes the nodes population size, N ij represents the nodes position i in the j − th dimension (Dm), n maxi − n mini denotes the interval of the nodes, and r (1, Dm) random numbers which is distributed uniformly in a Dm dimensional vector. After node initialization, the nodes are trying to finding the solution for optimization problem by iterative manner.…”
Section: Intrusion Scenario Reconstructionmentioning
confidence: 99%
See 1 more Smart Citation
“…The risk value of the node is calculated based on successive rate and risk probability. Initially, the nodes (17) From the above equation, M denotes the nodes population size, N ij represents the nodes position i in the j − th dimension (Dm), n maxi − n mini denotes the interval of the nodes, and r (1, Dm) random numbers which is distributed uniformly in a Dm dimensional vector. After node initialization, the nodes are trying to finding the solution for optimization problem by iterative manner.…”
Section: Intrusion Scenario Reconstructionmentioning
confidence: 99%
“…Compared with the traditional IDS scenarios, blockchain mainly focuses on cyber-attacks with good tracing of behaviours and also provides a reliable connection to normal IoT devices [15,16]. Hence, security of IoT environment is improved and targeted intrusion prevention is reached while authenticating all IoT devices into the third party or security managers [17]. Evidence collection and analysis can be helpful in IDS, which compares the device pattern to the logically related transactions for attacks detection.…”
Section: Introductionmentioning
confidence: 99%
“…Elsaeidy et al [260] focused on demonstrating by the trial tests that the uses of the CNN, with a moderately basic structure contrasted with those utilized in literature, offers fascinating discovery and classify the IM opening stator winding faults outcomes. The best possible recognition of the beginning between turn short-circuits of the IM stator winding was accomplished in the wake of estimating the most extreme 2000 examples of the demonstrative signstator current transient.…”
Section: Smart Energy Management System In Smart Homesmentioning
confidence: 99%
“…It will not be a door-to-door service but rather operates with predetermined stops within 150 meters of the destination. A centralized control system will continually contact the cab, which will take the quickest route to the destination [260]. The complete route that taxis may travel is made up of 87 stops.…”
Section: F Smart Mobilitymentioning
confidence: 99%
“…In fact, as shown in [30][31][32], machine learning (ML) technologies are used in intrusion detection systems, but dataset pre-processing and anomaly traffic detection are time-consuming and complex [33,34]. However, using deep learning (DL) technologies [35][36][37][38], features may be mapped to a higher degree with more distinct feature spaces. Combining DL technologies and a traditional ML model reduces the preprocessing time [39].…”
Section: Introductionmentioning
confidence: 99%