2021 13th International Conference on Information Technology and Electrical Engineering (ICITEE) 2021
DOI: 10.1109/icitee53064.2021.9611880
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Machine Learning approaches for resource constrained IIoT devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…For system evaluation, the specific set will be applied to a modeling example, where assuming that [ 43 45 ]: is the m x 1 state vector, it is now easy to represent the state-space representation as below: …”
Section: Phishing Campaigns Identificationmentioning
confidence: 99%
“…For system evaluation, the specific set will be applied to a modeling example, where assuming that [ 43 45 ]: is the m x 1 state vector, it is now easy to represent the state-space representation as below: …”
Section: Phishing Campaigns Identificationmentioning
confidence: 99%
“…From the literature above, we conclude that researchers have identified that the sheer increase in cyberattacks can only be effectively dealt with the help of machine learning methodologies [ 12 , 13 ].…”
Section: Related Literaturementioning
confidence: 99%
“…This particular sports volleyball team has several IoT technologies that do not make the most of their capabilities in the context of cyber security. The scenario aims to eliminate technology waste, make the most of already installed products, and maintain the responsibility of business application and information technology partners [ 13 , 19 ].…”
Section: The Use Case Of the Volleyball Industrymentioning
confidence: 99%
“…When tackling energy network security issues, researchers should take a systematic approach and examine all phases of the holistic resilience cycle. To enhance the cyber-physical integrity of electrical power networks [ 6 , 7 ], the idea of the Holistic Resilience Cycle was presented. This is a structured method to power system security that is defined by four steps (prevention and planning, detection, mitigation and reaction, and system recovery) as being inextricably linked and comprehensible only in context.…”
Section: Introductionmentioning
confidence: 99%