Anomalies Detection in Fog Computing Architectures Using Deep Learning

[1]  S. Smys,et al.  Efficient cryptographic approach for data security in wireless sensor networks using MES V-U , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[2]  Marimuthu Palaniswami,et al.  Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering , 2017, IEEE Internet of Things Journal.

[3]  Abul Bashar,et al.  SURVEY ON EVOLVING DEEP LEARNING NEURAL NETWORK ARCHITECTURES , 2019, December 2019.

[4]  S. Smys,et al.  Privacy preserving approaches in cloud computing , 2018, 2018 2nd International Conference on Inventive Systems and Control (ICISC).

[5]  Manas Ranjan Patra,et al.  A Novel Classification via Clustering Method for Anomaly Based Network Intrusion Detection System , 2009 .

[6]  Manas Ranjan Patra,et al.  A Hybrid Clustering Approach for Network Intrusion Detection Using Cobweb and FFT , 2009 .

[7]  Senthil Kumar T. Dr,et al.  EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK , 2019, Journal of ISMAC.

[8]  S Smys,et al.  DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING , 2019, Journal of Ubiquitous Computing and Communication Technologies.

[9]  A. Praveena,et al.  Prevention of inference attacks for private information in social networking sites , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).

[10]  A. Praveena,et al.  Anonymization in Social Ne tworks: A Survey on the issues of Data Privacy in Social Network Sites , 2016 .

[11]  Naveen K. Chilamkurti,et al.  Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.

[12]  Robert Bestak,et al.  BIG DATA ANALYTICS FOR SMART CLOUD-FOG BASED APPLICATIONS , 2019, Journal of Trends in Computer Science and Smart Technology.

[13]  Jennifer S. Raj,et al.  Secure interoperable architecture construction for overlay networks , 2015, 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).

[14]  D Sivaganesan,et al.  DESIGN AND DEVELOPMENT AI-ENABLED EDGE COMPUTING FOR INTELLIGENT-IOT APPLICATIONS , 2019, Journal of Trends in Computer Science and Smart Technology.

[15]  S. Smys,et al.  Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks , 2018, Wirel. Pers. Commun..