منابع مشابه
Intrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملislanding detection methods for microgrids
امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...
15 صفحه اولIoT BASED GARBAGE GAS DETECTION SYSTEM
Waste management is the precise name for the collection, transportation, disposal and monitoring of waste. Curb side collection, Incineration is the most common method of disposal in which waste is collected at regular intervals by specialized trucks and subjected for combustion. Diseases which are caused by garbage gases are Asthma, Cholera, various skin diseases etc. The gases emitting from t...
متن کاملTrust-Based IoT Participatory Sensing for Hazard Detection and Response
The physical world can be monitored by ubiquitous Internet of Things (IoT) devices through participatory sensing by which a huge amount of data is collected and analyzed in the cloud for hazard detection and response. In this paper, we propose a Trust as a Service (TaaS) cloud utility leveraging a cloud hierarchy for assessing service trustworthiness of IoT devices so as filter out untrustworth...
متن کاملLinear SVM-Based Android Malware Detection for Reliable IoT Services
Current many Internet ofThings (IoT) services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. Inmost cases, mobile devices have become clutteredwith important personal user...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2021
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1797/1/012022