AI-Enabled Threat Detection and Security Analysis for Industrial IoT 2021
DOI: 10.1007/978-3-030-76613-9_10
|View full text |Cite
|
Sign up to set email alerts
|

A Snapshot Ensemble Deep Neural Network Model for Attack Detection in Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 42 publications
0
5
0
Order By: Relevance
“…π‘œπ‘ π‘‘ 𝑖 , βˆ€π‘– ∈ 𝑛 π‘ƒπ‘œπ‘ (5) cos 𝑑 𝑖 = { Similar to last evolutionary that is generated on optimizer, superiority was demoralized in order to supply an optimum answer at each iteration. At the time of mating, males alike all bird uses their energies for garnishing as well as constructing the bower.…”
Section: π‘π‘œπ‘ (𝑖) π‘ƒπ‘œπ‘  = π‘Ÿπ‘Žπ‘›π‘‘(1 𝑛 π‘£π‘Žπ‘Ÿ ) β‹… (π‘‰π‘Žπ‘Ÿmentioning
confidence: 99%
See 1 more Smart Citation
“…π‘œπ‘ π‘‘ 𝑖 , βˆ€π‘– ∈ 𝑛 π‘ƒπ‘œπ‘ (5) cos 𝑑 𝑖 = { Similar to last evolutionary that is generated on optimizer, superiority was demoralized in order to supply an optimum answer at each iteration. At the time of mating, males alike all bird uses their energies for garnishing as well as constructing the bower.…”
Section: π‘π‘œπ‘ (𝑖) π‘ƒπ‘œπ‘  = π‘Ÿπ‘Žπ‘›π‘‘(1 𝑛 π‘£π‘Žπ‘Ÿ ) β‹… (π‘‰π‘Žπ‘Ÿmentioning
confidence: 99%
“…Generally, the security aims include privacy, in terms of data that is not improperly released to the individuals must be destroyed [4]. Hence, society is becoming helpless to cyber-threats like denial-of-service (DoS) attacks by hackers because of the limitless present IoT-based connected devices [5]. For example, that reject direct access to devices, etc.…”
Section: β–‘ 1 Introductionmentioning
confidence: 99%
“…Consequently, a snapshot ensemble that develops multiple models from a single training process is introduced as the solution. This technique combines different models' predictions while saving models during the training phase and employing them to create an ensemble setup [27]. Furthermore, the learning rate used during the training stage is aggressively altered using the Cosine annealing technique defining the initial learning rate and the number of training epochs to avoid similarity among models.…”
Section: ) the Proposed Snapshot Ensemble Deep Neural Network (Sednn)...mentioning
confidence: 99%
“…DL is a sub-field of machine learning (ML) that has increased great detection in numerous regions owing to its development in accuracy in difficult tasks and the current growth in software and hardware [8]. DL models enhance cybersecurity methods that prevent attacks by recognizing patterns that are dissimilar from usual behavior [9]. Cyberattacks share a general feature with image detection because more than 99 percent of the novel attacks are little mutants of present ones; in a similar technique modification in pictures can be recognized by little variations in their pixels.…”
Section: Introductionmentioning
confidence: 99%