DC Field | Value | Language |
---|---|---|
dc.contributor.author | Naik, Bighnaraj | ko |
dc.contributor.author | Obaidat, Mohammad S. | ko |
dc.contributor.author | Nayak, Janmenjoy | ko |
dc.contributor.author | Pelusi, Danilo | ko |
dc.contributor.author | Vijayakumar, Pandi | ko |
dc.contributor.author | Islam, S. K. Hafizul | ko |
dc.date.accessioned | 2020-03-19T01:23:12Z | - |
dc.date.available | 2020-03-19T01:23:12Z | - |
dc.date.created | 2020-03-17 | - |
dc.date.created | 2020-03-17 | - |
dc.date.issued | 2020-03 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, v.16, no.3, pp.1947 - 1956 | - |
dc.identifier.issn | 1551-3203 | - |
dc.identifier.uri | http://hdl.handle.net/10203/272352 | - |
dc.description.abstract | Internet of Things (IoT) has evolved for building smart environments in a distributed system, where the data produced by IoT devices are transmitted through Edge computing devices to streamline the flow of traffic from IoT devices to a distributed network. In such a scenario, the attacker introduces many attacks to the edge before forwarding them to distributed servers. This necessitates intrusion detection systems for such environments to mitigate security attacks. This paper has projected a basis for characterization of intrusive behaviors in a distributed system based on the functional link neural nets response weighted-average and teaching-learning metaheuristic with elitism on weight-space. The proposed technique makes use of teaching-learning metaheuristic optimization to obtain suitable parameters for the functional link neural net. Furthermore, the processing of duplicate parameters is successfully avoided by using mutation operation. In addition to this, in this paper the proposed method is found to be more efficient in terms of computational burden. | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things | - |
dc.type | Article | - |
dc.identifier.wosid | 000510903200047 | - |
dc.identifier.scopusid | 2-s2.0-85078416410 | - |
dc.type.rims | ART | - |
dc.citation.volume | 16 | - |
dc.citation.issue | 3 | - |
dc.citation.beginningpage | 1947 | - |
dc.citation.endingpage | 1956 | - |
dc.citation.publicationname | IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS | - |
dc.identifier.doi | 10.1109/TII.2019.2920831 | - |
dc.contributor.nonIdAuthor | Naik, Bighnaraj | - |
dc.contributor.nonIdAuthor | Nayak, Janmenjoy | - |
dc.contributor.nonIdAuthor | Pelusi, Danilo | - |
dc.contributor.nonIdAuthor | Vijayakumar, Pandi | - |
dc.contributor.nonIdAuthor | Islam, S. K. Hafizul | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Neural networks | - |
dc.subject.keywordAuthor | Optimization | - |
dc.subject.keywordAuthor | Intrusion detection | - |
dc.subject.keywordAuthor | Ecosystems | - |
dc.subject.keywordAuthor | Servers | - |
dc.subject.keywordAuthor | Image edge detection | - |
dc.subject.keywordAuthor | Edge computing | - |
dc.subject.keywordAuthor | elitism | - |
dc.subject.keywordAuthor | functional link artificial neural network (FLANN) | - |
dc.subject.keywordAuthor | Internet of Things (IoT) | - |
dc.subject.keywordAuthor | intrusion detection system (IDS) | - |
dc.subject.keywordAuthor | metaheuristic | - |
dc.subject.keywordPlus | INTRUSION-DETECTION | - |
dc.subject.keywordPlus | OPTIMIZATION | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.