2022
DOI: 10.1007/978-981-19-2828-4_24
|View full text |Cite
|
Sign up to set email alerts
|

The Use of LSTM Models for Water Demand Forecasting and Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
0
0
Order By: Relevance
“…Using certain trust management solutions, the internal attackers could be found by the nodes and reported to the Controller [20]. In addition, network security detection methods based on artificial intelligence, such as LSTM and CNN, are also very helpful for SDWSNs to discover network attackers [55,56]. To the alarm report message, N A signs its digest using S A and the CC-IBS algorithm, and sends it to the Controller along with its signature as:…”
Section: Node Admission and Keymentioning
confidence: 99%
“…Using certain trust management solutions, the internal attackers could be found by the nodes and reported to the Controller [20]. In addition, network security detection methods based on artificial intelligence, such as LSTM and CNN, are also very helpful for SDWSNs to discover network attackers [55,56]. To the alarm report message, N A signs its digest using S A and the CC-IBS algorithm, and sends it to the Controller along with its signature as:…”
Section: Node Admission and Keymentioning
confidence: 99%