2023
DOI: 10.1016/j.seta.2022.102983
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning based energy efficient optimal RMC-CNN model for secured data transmission and anomaly detection in industrial IOT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 22 publications
0
11
0
Order By: Relevance
“…In the industrial IoT, industrial control networks mostly have obvious structural systems, from bottom to top are the on-site control layer network, process control layer network/data acquisition and monitoring layer, and enterprise management layer. As shown in Figure 2, a typical industrial IoT security control network structure is presented [24].…”
Section: Application Of Lightgbm Feature Algorithm Fusion With Multil...mentioning
confidence: 99%
“…In the industrial IoT, industrial control networks mostly have obvious structural systems, from bottom to top are the on-site control layer network, process control layer network/data acquisition and monitoring layer, and enterprise management layer. As shown in Figure 2, a typical industrial IoT security control network structure is presented [24].…”
Section: Application Of Lightgbm Feature Algorithm Fusion With Multil...mentioning
confidence: 99%
“…For the purpose of outlier identification in the IIoT, Sankaran et al [14] suggested a technique for energy-efficient, protected data transfer. The primary goal of this method is to provide an industrial IoT data transfer technique that is both safe and private.…”
Section: Related Workmentioning
confidence: 99%
“…where, 𝜗 * j − 𝜗 p is represented as the detection speed. Then the context layer with hidden layer equation is given in (11),…”
Section: • Hyb Eesccnn For Classification Processmentioning
confidence: 99%
“…But the performance, like a battery's lifetime, computing resources scarcity and storage, can be limited due to the challenges of mobile devices. Stored data security is another fundamental problem in cloud and mobile computing 11‐13 . The Internet‐based next‐generation computing system is cloud computing which provides the user access to an easy and customizable service with different applications in the cloud.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation