2020
DOI: 10.1007/s00521-020-05189-8
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection via blockchained deep learning smart contracts in industry 4.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
2
1

Relationship

3
7

Authors

Journals

citations
Cited by 86 publications
(35 citation statements)
references
References 35 publications
0
35
0
Order By: Relevance
“…Proposals for the development and future improvements of this framework should focus on the automated optimization of the appropriate parameters of method pre-training to achieve an even more efficient, accurate, and faster categorization process. It would also be important to study the expansion of this system by implementing more complex architecture with Siamese neural networks in an environment of parallel and distributed systems [60] or over blockchain [61,62]. Finally, an additional element that could be studied in the direction of future expansion concerns the operation of a network with methods of self-improvement and re-defining its parameters, so that the process of selecting the architectural hyper-parameters can be fully automated in order to identify dark web services [63,64], exploits from the dark web [65][66][67][68], and classify malicious traffic from this network [69][70][71].…”
Section: Discussionmentioning
confidence: 99%
“…Proposals for the development and future improvements of this framework should focus on the automated optimization of the appropriate parameters of method pre-training to achieve an even more efficient, accurate, and faster categorization process. It would also be important to study the expansion of this system by implementing more complex architecture with Siamese neural networks in an environment of parallel and distributed systems [60] or over blockchain [61,62]. Finally, an additional element that could be studied in the direction of future expansion concerns the operation of a network with methods of self-improvement and re-defining its parameters, so that the process of selecting the architectural hyper-parameters can be fully automated in order to identify dark web services [63,64], exploits from the dark web [65][66][67][68], and classify malicious traffic from this network [69][70][71].…”
Section: Discussionmentioning
confidence: 99%
“…The introduction of microprocessor-based intelligent electronic devices (IEDs), together with cost-effective communication technologies, upgrades and automates the processes of energy distribution and rapid debugging and isolation of malicious material [40][41][42]. Therefore, based on the effective automation of the distribution process, utilities have the opportunity to create new business models of highly reliable power supply for both critical and industrial applications as well as residential consumers.…”
Section: Distribution Automationmentioning
confidence: 99%
“…The introduction of microprocessor-based Intelligent Electronic Devices (IEDs) together with cost-effective communication technologies, upgrades and automates the processes of energy distribution and rapid debugging and isolation of malicious material [40]- [42]. Therefore, based on the effective automation of the distribution process, utilities have the opportunity to create new business models of highly reliable power supply for both critical industrial applications as well as residential consumers.…”
Section: Distribution Automationmentioning
confidence: 99%