2021
DOI: 10.1007/s12652-020-02769-3
|View full text |Cite
|
Sign up to set email alerts
|

Time dependent anomaly detection system for smart environment using probabilistic timed automaton

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…In parallel, another group of researchers has focused on using IoT to improve security in smart electrical networks. A relevant study in this context is the work of [15], which explores how IoT devices can provide an additional layer of anomaly detection by constantly monitoring the status of power grid assets [16]. This approach aligns with the growing trend of using IoT devices to collect real-time data and enable faster responses to anomalies or threats.…”
Section: Review Of Similar Workmentioning
confidence: 99%
“…In parallel, another group of researchers has focused on using IoT to improve security in smart electrical networks. A relevant study in this context is the work of [15], which explores how IoT devices can provide an additional layer of anomaly detection by constantly monitoring the status of power grid assets [16]. This approach aligns with the growing trend of using IoT devices to collect real-time data and enable faster responses to anomalies or threats.…”
Section: Review Of Similar Workmentioning
confidence: 99%
“…Time-series data [43,44,45,46,47,48,49,50] Smart city [51,52,53,54] Monitoring machinery health [55,5] Robotics and manufacturing [56,57,58] Detection applications for IoT sensors [59,60] Other industrial or manufacturing [61,62,63,64] Surveillance and video [65,66,67] General-purpose frameworks [68,69,70] Network and communication frameworks [71,72,73,74] User security and privacy frameworks [75,76,77] Other frameworks [78,79] Network traffic in IoT [80,81,82] Device and infrastructure security [83,21,84,85,86,87] Data transport security [88,…”
Section: Application Category Referencementioning
confidence: 99%
“…GNN monitoring is performed to monitor nodes and devices connected to those nodes using the underlying graph structure. To protect private data from home devices, Venkatraman et al [86] used a Probabilistic Timed Automaton (PTA) to model the activities of smart devices, keeping intruders from stealing confidential data. Furthermore, Said et al [87] use the support vector machine (SVM) classifier to help preserve data accuracy while avoiding sending false alerts to hospital infrastructure.…”
Section: Security Applications For Iot Devices and Infrastructurementioning
confidence: 99%
“…Meanwhile, IDS is recommended as a highly important security solution for newly-developed online web-based applications in relation to smart cities and Internet of Things (IoT) atmosphere. In general, IDS-based systems commence a greater quantity of unsuitable and fake alarms, whenever abnormal performances are identified [8]. If the activated fake alarm rate is too high, I t tend to diminish the performance of IDS in contrast to cyber-attacks and makes the job of security analysts completely challenging.…”
Section: Introductionmentioning
confidence: 99%