2017
DOI: 10.1109/tc.2016.2560839
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(36 citation statements)
references
References 38 publications
0
36
0
Order By: Relevance
“…We have conducted experiments on K-nearest neighbor, K-means and neural network codes to show that an important energy can be saved by our approximate CPU in the ML applications in which these codes are widely used. There are several applications that uses K-nearest neighbor [3,26,27], K-means [28,29] and neural networks [30,31] at IoT devices in such a way that classification, clustering In the literature, dynamic accuracy control is also achieved via dynamic voltage scaling (DVS) [24,25]. There is no dedicated approximate operation block in DVS, the selected parts of the processor are forced to behave inexactly by lowering the supply voltage.…”
Section: Iot Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…We have conducted experiments on K-nearest neighbor, K-means and neural network codes to show that an important energy can be saved by our approximate CPU in the ML applications in which these codes are widely used. There are several applications that uses K-nearest neighbor [3,26,27], K-means [28,29] and neural networks [30,31] at IoT devices in such a way that classification, clustering In the literature, dynamic accuracy control is also achieved via dynamic voltage scaling (DVS) [24,25]. There is no dedicated approximate operation block in DVS, the selected parts of the processor are forced to behave inexactly by lowering the supply voltage.…”
Section: Iot Applicationsmentioning
confidence: 99%
“…We have conducted experiments on K-nearest neighbor, K-means and neural network codes to show that an important energy can be saved by our approximate CPU in the ML applications in which these codes are widely used. There are several applications that uses K-nearest neighbor [3,26,27], K-means [28,29] and neural networks [30,31] at IoT devices in such a way that classification, clustering and deep learning processes used in IoT systems can also be carried out on the resource-constrained IoT devices, not only on the cloud. So, an approximate CPU can help them to decrease power consumption while calculating intensive computation loads of these algorithms.…”
Section: Iot Applicationsmentioning
confidence: 99%
“…It will generate oscillation when reconstructing the signal. Although the continuity of soft threshold function is good, shrinkage treatment will affect the approximation degree of reconstructed signal [15,19]. In view of this, a new threshold function is designed on the basis of the hard and soft threshold functions above, and the control factor is introduced to control the shape of the function.…”
Section: 1mentioning
confidence: 99%
“…Moreover, Mishra et al presented a study on intrusion detection in cloud environment [6]. Viegas et al proposed a featureselection method to improve the accuracy of IDS and to reduce the energy consumption in embedded system [7].…”
Section: Literature Reviewmentioning
confidence: 99%