2018
DOI: 10.1080/1206212x.2018.1533613
|View full text |Cite
|
Sign up to set email alerts
|

Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 44 publications
0
11
0
Order By: Relevance
“…It can be noticed that our approach demonstrates considerably greater performance matched to the other methods. The models showing neighboring efficiency to our approach are the Bloom filter model, the Random Forest model, the AutoMLP [54] and the Feng et al [34] model. But, their anomaly detection ability is still noticeably inferior to ours.…”
Section: ) Rq2: Comparison With Other Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…It can be noticed that our approach demonstrates considerably greater performance matched to the other methods. The models showing neighboring efficiency to our approach are the Bloom filter model, the Random Forest model, the AutoMLP [54] and the Feng et al [34] model. But, their anomaly detection ability is still noticeably inferior to ours.…”
Section: ) Rq2: Comparison With Other Modelsmentioning
confidence: 99%
“…In reply to the investigation question (RQ2), we match the effectiveness of the suggested approach with the stateof-the-art approaches [34], [52]- [54] in order to find out the efficiency enhancement of the projected approach. The comparison shows that our approach shows significant performance improvement in terms of accuracy over the benchmark models.…”
Section: A Research Questionsmentioning
confidence: 99%
See 1 more Smart Citation
“…It should be noted that the recommended IDS schemes in the current literature, including the ones discussed earlier involving data mining [42][43][44], machine learning [39,45], some form of artificial intelligence [46,47], or the like, are implemented in the sensors themselves, with the majority of them being specific-attack-based. Also, most of the authors comment on the small size of sensor batteries and memory space, but without much focus on the amelioration of the effects of the implemented security schemes on the efficiency and shelf life of the sensors involved, especially in terms of sensor memory space.…”
Section: Wireless Sensor Network' Vulnerabilities and Threatsmentioning
confidence: 99%
“…The results of applying some classical machine learning algorithms (K-means, Naive Bayesian, GMM, PCA-SVD) are presented in [9] using the example of the Gas Pipeline dataset. Fully connected evolutionary based neural networks are used in [10] to detect anomalies. In particular, the Gray Wolf Optimize algorithm is used to increase the speed of network learning.…”
Section: Introductionmentioning
confidence: 99%