International Journal of Sensors Wireless Communications and Control - Online First
Description text for Online First listing goes here...
-
-
Wireless and Mobile Networking: Management, Performance, and Security
Authors: Pundru Chandra Shaker Reddy and Yadala SucharithaAvailable online: 13 August 2025More Less
-
-
-
A Deep Dive into Detecting and Investigating Fileless Malware
Authors: Rudransh Dewan, Swathi Rangaswamy and Sivakumar VenuAvailable online: 15 May 2025More LessFileless malware is a very advanced threat that has garnered significant attention due to its highly stealthy and secretive nature, as well as its ability to easily evade traditional security measures. Unlike traditional malware, which leaves footprints on disks, fileless malware operates in the shadows of system memory, thereby surpassing detection and analysis. In this paper, we provide a comprehensive review of fileless malware, including its evolution, detection techniques, and mitigation strategies. We also explore the historical context of fileless malware. By examining various methodologies employed by researchers and practitioners worldwide, this analysis aims to shed light on strategies for combating the evolving threat posed by fileless malware. We discuss current research efforts and emerging trends in fighting fileless malware, emphasizing the importance of proactive defense strategies in mitigating this evolving threat landscape. Our analysis delves into a comparative study of traditional malware and fileless malware, specifically focusing on Kovter. Leveraging advanced tools like Any.run and VirusTotal, we examine the unique challenges that traditional antivirus solutions encounter when attempting to detect fileless malware. This study underscores the limitations of conventional detection methods in addressing the stealthy nature of these advanced threats.
-
-
-
Next-Gen Health Informatics- Artificial Intelligence Powered Diagnostics and Blockchain Enabled Data Integrity For Radiological Image Analysis
Authors: Virendra S. Gomase, Arjun P. Ghatule, Rupali Sharma, Satish Sardana and Suchita P. DhamaneAvailable online: 25 April 2025More LessThe revolutionary effects of blockchain technology and artificial intelligence (AI) on the radiology department of healthcare administration are examined in this article. AI has become a vital tool in boosting image analysis precision, streamlining workflows, and improving patient outcomes as the need for prompt and accurate medical diagnosis increases. Concurrently, the incorporation of blockchain technology tackles important issues with patient privacy, interoperability, and data security. This paper presents the basic concepts of blockchain and artificial intelligence, with an emphasis on how they could cooperate in radiology. The primary objectives of integrating AI and blockchain in radiology are to increase diagnostic accuracy, safeguard the privacy and integrity of medical data, and facilitate seamless data sharing between healthcare providers. This essay demonstrates the effective use of AI-driven diagnostic tools in conjunction with blockchain's secure data management capabilities through a thorough literature research and analysis of recent deployments. According to research, combining these technologies can increase radiological practice efficiency, lower diagnostic error rates, and boost patient confidence in the healthcare system. Significant results could come from this integration, including improved data transparency, more efficient workflows, and more individualized patient care. To fully reap the benefits, however, issues like technological constraints, legal restrictions, and moral worries about algorithmic bias and data privacy must be resolved. In the end, this paper emphasizes how crucial it is to carry out more research and development in order to fully utilize blockchain and artificial intelligence (AI) to transform healthcare administration in radiology and beyond.
-
-
-
5G-Based Wireless Sensor Networks: Performance Insights and Application Optimization
Available online: 07 April 2025More LessIntroductionThe introduction of 5G technology has revolutionized Wireless Sensor Networks (WSNs) by significantly enhancing connectivity, reducing latency, and improving scalability.
MethodsThis paper presents a performance analysis framework for 5G-based WSNs, focusing on key parameters such as numerology, deployment strategies (e.g., Multi-Access Edge Computing and centralized models), traffic loads, and link capacity allocations. The framework evaluates their impact on critical performance metrics, including latency, throughput, energy efficiency, and reliability.
ResultsSimulation results reveal that deploying edge computing significantly reduces latency (e.g., 5.325 ms compared to 26.725 ms in centralized architectures), while optimized link capacity allocation and numerology configurations enhance overall network efficiency.
ConclusionThese findings demonstrate how 5G parameters can be fine-tuned to optimize WSN performance for diverse applications such as industrial automation, smart cities, and healthcare. The study provides practical insights into achieving real-time, scalable, and energy-efficient operations in 5G-enabled WSNs.
-
-
-
Firmware Over the Air for Securely Updating ECUs of the Vehicle
Authors: Bhavesh Raju Mudhivarthi, Prabhat Thakur, Alok Kumar, Sagar Anturkar and G. SinghAvailable online: 24 January 2025More LessIntroductionAn automobile is a software-defined machine on top of the wheels including more than 100 electronic control units (ECU) with million lines of code. The integration of ECU in the automobile ensures the customer’s needs by providing safety, security, entertainment, and comfort features.
MethodsThe firmware integrated into the ECU should be updated to avoid latency in operation and bugs, and to add new features. The traditional update process of ECU holds loopholes like more waiting time, unavailability of service centers, and security threats. To overcome this, over-the-air (OTA) updates are introduced in the vehicle, but security is the major concern while transmitting firmware over the air.
ResultsThe proposed system ensures the wireless firmware update with the uptane framework with background Timestamp Update Framework (TUF) ensures the security. The timestamp generated is valid for 86400 seconds to validate the freshness. In addition, security assessment and reverse engineering are performed on the designed system to check for security breaches.
ConclusionThe system secures the firmware over arbitrary and replay attacks on the Original Equipment Manufacturer (OEM) server.
-
-
-
RSSI Enabled Routing in Fiber Wireless Access Network
Authors: Sangita Solanki, Raksha Upadhyay, Uma Rathore Bhatt and Vijay BhatAvailable online: 07 January 2025More LessIntroductionThere are various concerns in Fiber wireless access networks, such as ONU placement, survivability, network planning andand its cost, architectural developments, etc. In this paper, we have focused on front end survivability of the network, which mainly depends on the routing algorithms employed at the front end of the network.
MethodThe effectiveness of the proposed scheme lies in finding the next alternate path in case of link/component failure with minimum delay. Hence, delay is the appropriate parameter to evaluate the efficacy of the proposed technique. In this paper, RSSI-based routing (RBRA) is proposed for various cases of link failures. Delay performance for each of the cases has been compared with two previous approaches maximum protection minimum link cost (MPMLC) andand minimum hop routing algorithm (MHRA).
ResultIt is found that RBRA performs better than MPMLC andand MHRA. For single link failure and two source destination pairs in the network with 50 wireless routers delay decreases by 58% andand 37% in RBRA as compared to MHRA andand MPMLC, respectively.
ConclusionHence, these algorithms can be integrated with RSSI-based route selection. This could be an attractive future direction for research.
-
-
-
Web-based Vulnerability Analysis and Detection
Authors: Narendra Singh Yadav, Ritek Rounak and Prakash Chandra SharmaAvailable online: 26 December 2024More LessIntroduction: In today’s digital world, protecting organizations from breaches, hacking, data theft, and unauthorized access is key. Web-based vulnerability analysis and detection is a big part of that. Method: This research introduces a new approach to web-based vulnerability assessment by combining advanced automated tools with human expertise, a complete way to identify, rank, and fix critical vulnerabilities in web applications and websites. Our research presents a new automated scanner built with Python and Selenium which can detect a wide range of vulnerabilities including SQL injection, cross-site scripting (XSS), and emerging threats. The tool’s modular architecture and regular expression-based detection methods allow for flexibility and speed in detecting common and uncommon vulnerabilities. We propose a framework for vulnerability ranking so organizations can prioritize their fix efforts. Our approach considers exploiting potential, severity, and patch availability to give a more accurate risk assessment. Through real-world web application testing we demonstrate the effectiveness of our approach in detecting and fixing vulnerabilities. Result: Our results show significant improvement in detection accuracy and speed compared to traditional methods, especially for complex and dynamic web applications. This research adds to the body of knowledge in web security and vulnerability management by combining advanced automated scanning with human expertise. Conclusion: Our findings provide practical advice for organizations looking to improve their cybersecurity in the ever-changing digital world.
-
-
-
Convolutional Neural Network-based Smart Disaster Management Framework for Real-time Detection and Management of Forest Fires
Authors: Kuldeep Singh, Eshaan Sharma, Puneet Kaur Baath, Kiranbir Kaur and Harminder SinghAvailable online: 13 December 2024More LessIntroductionTimely detection of catastrophic natural disasters, such as forest fires, is critical to minimizing losses and ensuring rapid response. Artificial intelligence is increasingly being recognized as a valuable tool in enhancing various stages of disaster management.
MethodThis paper presents the development of a smart framework utilizing machine learning techniques for real-time detection and monitoring of natural disasters, specifically forest fires. The proposed approach employs a 10-layer convolutional neural network (CNN) that classifies aerial images into Fire, Non-Fire, and Smoke categories with high precision and speed. In addition to this, a CNN-based feature extraction process is performed and integrated with various ML classifiers, including support vector machine, k-nearest neighbor, decision tree, random forest, and extra trees.
ResultsExtensive performance analysis reveals that the proposed 10-layer CNN model outperforms other classifiers, achieving an accuracy of 97.64% in the binary classification of fire vs. non-fire and 95.61% in the three-class classification of Fire, Non-Fire and Smoke classes. Furthermore, a comparative study with existing state-of-the-art methods demonstrates the proposed model's superior performance in both accuracy and computational complexity.
ConclusionThese results demonstrate the potential of the proposed CNN-based framework to serve as a reliable and effective tool for real-time disaster management across various applications, providing valuable support to emergency response teams in mitigating the impact of natural disasters.
-
-
-
BLE-IOT-PID: Bluetooth Low Energy (BLE) Based IOT Controlled PID Controller for Multi-loop Pilot Plant with Quantum Firefly PSO Optimization
Authors: Jotiram Deshmukh, Ritesh Tirole and Anand BhaskarAvailable online: 13 December 2024More LessIntroductionConventional Proportional–integral–derivative (PID) controls for multi-loop pilot plants are constrained by wired connections, outdated control techniques, and inefficient real-time data sensing and acquisition. As a result, inefficiencies arise, where control loops for parameters like temperature, level, and flow require continuous dynamic adjustments and precise regulation. To overcome this issue, a full wireless solution is proposed which is the need of today’s era.
MethodThis study presents a novel PID controller for a multi-loop pilot plant, utilizing a Bluetooth Low Energy (BLE) based Internet of Thing (IoT) system for wireless, real-time data sensing and control. The system gathers data through sensors and sends it to cloud storage via a BLE access point, which is then monitored using a mobile app called BIP. In addition to monitoring, the BIP app serves as a control interface, allowing PID parameters to be adjusted through a Quantum Firefly-Particle Swarm Optimization (QFPSO) algorithm integrated with the ThingSpeak cloud. This enables the control module to function in three distinct modes for the plant’s loops. Users can manually configure PID parameters, as well as temperature and level set-points, while the system automatically regulates the flow set-point based on real-time data. The BLE-based IoT system comprises five modules using Arduino Nano 33 BLE: a Flow Sensor, a Temperature Sensor, a Level Sensor, IoT communication, and an access point. These modules provide more accurate data than traditional sensing systems.
ResultKey benefits of the proposed system include wireless accessibility, user-friendliness, a simplified design, ease of upgrades, and consistent control across multiple loops. The proposed system can be easily adapted for various types of industrial control systems with minimal effort.
ConclusionAdditionally, the developed wireless sensor node can replace wired sensor nodes in any electronic system.
-
-
-
An Enhanced Lightweight Secure Authentication and Privacy-Preserving Approach for VANETs
Available online: 13 December 2024More LessAims and BackgroundVehicular-Adhoc-Networks (VANETs) have gained a lot of attention in the past ten years. Used extensively in intelligent transport systems (ITS), it facilitates the sharing of traffic data between vehicles and their immediate surroundings, resulting in a more pleasant driving experience. When it comes to VANET security, privacy and security are the two biggest obstacles. To improve security in VANET, authentication and privacy-preserving methods are required because any specific disclosure of vehicle specifics, including route data, might have devastating consequences.
Objectives & MethodologyIn light of this need, this research introduces a novel framework for VANETs called enhanced timed efficient stream loss-tolerant authentication (ETESLTA), which enables a new kind of lightweight authentication while simultaneously protecting users' privacy. Initialisation, registration, mutual authentication, broadcasting and verification, and vehicle revocation are all parts of the suggested model. Furthermore, the ETESLTA method requires very little memory while yet providing excellent broadcast authentication, just like TESLTA. In addition, the ETESLTA method incorporates a cuckoo filter to record the real details of cars inside the RSU's detection range.
ResultsThe suggested approach provides strong anonymity to achieve privacy and resists common assaults, and it features lightweight mutual authentication between the parties. A wide scale of experiments are conducted and the outcomes are evaluated in terms of numerous metrics to ensure the ETESLTA technique performs well.
ConclusionThe experimental results demonstrated that the ETESLTA method was superior to the most current state-of-the-art approaches.
-
-
-
60-GHz Millimeter-Wave over Visible Light Communications for Downlink Wireless Networks
Authors: Bouthaina Hamami and Leila GrainiAvailable online: 07 November 2024More LessBackground and ObjectiveIn this paper, we address potential solution for downlink wireless communications by integrating visible light communications (VLC) with the broadband radio frequency (RF) networks operating at 60 GHz-millimeter wave (mmWave) band. For this hybrid design, the outdoor 60 GHz-mmWave based RF link is utilized to ensure backhaul connectivity for VLC indoor system, while the VLC exploiting the lighting infrastructure that essentially used LEDs as optical source to provide low-cost and high-speed data access.
MethodsThe hybrid 60 GHz-mmWave/VLC system is analyzed by using 16-QAM OFDM signal, and its performance is investigated by evaluating the signal to noise ratio (SNR) and the received signal power distributions, for regular placement of LEDs and random location of receivers within the room. The impact of the transmitter-receiver parameters, and their orientations and directivities are also considered.
ResultsNumerical results show the efficiency of the proposed system, which can retransmit RF signals at 60 GHz-mmWave band using visible optical carriers in the indoor environment.
ConclusionThe results suggest that the hybrid 60 GHz-mmWave/VLC system is able to provide reliable wireless data transmission, making it an attractive solution for downlink indoor communications.
-
-
-
Enhancing Image Dehazing Efficiency with Dual Colour Space Attentional Deep Networks
Authors: Ashwini A M, Anne Gowda A B, Sridevi N, Nanditha Krishna, Babu N V and Anil Kumar DAvailable online: 07 November 2024More LessAims and BackgroundImage dehazing is an essential task in computer-vision, aimed at enhancing the clarity and visibility of images degraded by fog and haze. Traditional methods often struggle with handling the complex scattering effects of haze and maintaining the natural colours of the scene.
Objectives and MethodologyTo address these challenges, we propose a novel approach termed Dual Colour Space Attentional Deep Network (DCSADN) for efficient image dehazing. Our method leverages the advantages of two-colour spaces: RGB and YCbCr, to boost the network's skill to capture both the luminance and chrominance information, thereby improving the dehazing performance. We employ a multi-stage training strategy to optimize the performance of the DCSADN. This multi-stage approach ensures that the network generalizes well across different types of haze conditions. Extensive experiments demonstrate the superiority of our method over state-of-the-art dehazing techniques.
ResultsThe results indicate that our approach not only achieves higher quantitative scores in terms of Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) but also produces dehazed images with more natural colours and details.
ConclusionThe findings reveal that the dual colour space processing and attentional modules are crucial for the enhanced performance of our method and providing a valuable tool for improving image quality in hazy conditions.
-
-
-
Performance Evaluation of mmWave Communication for Real-Time UAV-Base Station Links
Authors: Sandeep Singh Virk and Sumanth Kumar ChennupatiAvailable online: 22 October 2024More LessIntroductionIn the context of modern communication networks, the increasing demand for high data rates, minimal latency, and improved reliability—especially in scenarios involving Unmanned Aerial Vehicles (UAVs)—calls for innovative solutions. Millimeter-wave (mmWave) communication emerges as a fitting choice due to its capacity to offer ample bandwidth and high data rates.
MethodThis research paper presents a comprehensive study that compares the performance of mmWave communication links across four different frequencies (6, 28, 60, and 120 GHz) for UAV-to-Base Station (BS) communication. The investigation, conducted through simulations, adheres to atmospheric conditions such as rain and fog, different environments (urban and rural) scenarios. It evaluates the suitability of mmWave frequencies using critical performance metrics: latency, received power, Bit Error Rate (BER) and Signal-to-Interference plus Noise Ratio (SINR). These metrics play a fundamental role in assessing communication link quality.
ResultOur findings reveal that leveraging higher mmWave frequencies—specifically 60 and 120 GHz—significantly enhances UAV-to-BS communication performance. Compared to lower frequencies, these higher bands exhibit reduced latency, higher data rates, and improved throughput. Consequently, mmWave frequencies beyond 60 GHz prove well-suited for UAV communication, facilitating efficient data exchange with minimal delay.
ConclusionFurthermore, the potential for reduced interference and enhanced reliability at these elevated frequencies makes them particularly advantageous in applications requiring seamless connectivity. Examples include UAV-assisted emergency response, surveillance, and remote sensing. These insights hold substantial implications for the design and deployment of UAV communication systems, highlighting mmWave technology’s transformative potential in the emerging era of aerial communication.
-
-
-
Multiple Criteria-Based Intelligent Techniques for Efficient Handover in Next-Generation Networks
Authors: Sudesh Pahal, Priyanka Nandal, Nidhi Gupta and Neetu SehrawatAvailable online: 14 October 2024More LessBackgroundSeveral wireless technologies are assumed to be operating in cooperation for next-generation networks. These networks offer various services to mobile users; however, efficient handover between different networks is the most challenging task in high mobility scenarios. The traditional signal strength-based handover algorithms are not able to cope with mobile users' high-quality requirements.
MethodsIn this paper, multiple criteria-based intelligent techniques are proposed to deal with inefficiencies related to handover. This technique makes use of artificial neural networks that take multiple parameters as inputs in order to predict the degradation of parameters. These predictions are further used to design rules for initiating handover procedures prior to service quality degradation.
ResultsBased on the prediction results obtained by deep neural networks, the handover decisions are recommended according to the type of application: conversational or streaming.
ConclusionThe simulation results demonstrate the efficacy of the proposed method as there is an improvement of up to 40% and 25% in terms of handover rate and service disruption time, respectively, with an acceptable prediction error of 0.05.
-
-
-
Data Collection and Recharging of Sensor Node by Mobile Sink in Wireless Sensor Network
Authors: Hanif Zafor, Tasher Ali Sheikh, Nabajyoti Mazumdar and Amitava NagAvailable online: 11 October 2024More LessThe wireless sensor network (WSN) has limited battery and storage capacity. The main challenge in static sink nodes is the lack of energy and data transfer to the base station (BS). A mobile sink (MS) is an excellent way to handle these difficulties in WSN. The use of an MS solution not only ensures long-term network functionality, but also improves network performance. In this paper, the MS-based data collection and recharging, mobile device is used for data collection from sensor nodes and recharging the sensor nodes throughout the network whenever required. There are two types of MS-based solutions described as (i) Mobile devices for data collection from sensor nodes in the network. (ii) Mobile device for collecting data and recharging sensor nodes from the network. Finally, in this paper, we presented the advantages, disadvantages, and other criteria of both types. Also, a potential framework is presented for data collection and recharging of sensor nodes by MS in WSN. The core contribution of this paper is present the state of art and future roadmap for data collection and recharging of sensor nodes by MS in WSN. The identification of the main open challenges and future direction in this research area are also highlighted and discussed.
-
-
-
Deep Learning-Based Network Security Situation Prediction for Sensor-Enabled Networks
Available online: 11 October 2024More LessAims and backgroundNetwork security detection has become increasingly complex due to the proliferation of Internet nodes and the ever-changing nature of network architecture. To address this, a multi-layer feedforward neural-network has been employed to construct a model for security threat detection, which has enhanced network security protection.
Objectives and MethodsImproving prediction accuracy and real-time performance, this research suggests an optimal strategy based on Clockwork Recurrent-Neural-Networks(CW-RNNs) to handle nonlinearity and temporal dynamics in network security circumstances. We get the model to pick up on both the short-term and long-term temporal aspects of network-security situations by using the clock-cycle RNN. To further improve the network security scenario prediction model, we tune the network hyperparameters using the Grey-Wolf-Optimization(GWO) technique. By incorporating a clock-cycle for hidden units, the model can improve its pattern recognition capabilities by learning short-term knowledge from high-frequency update modules and preserving long-term memory from low-frequency update modules.
ResultsThe optimized clock-cycle RNN achieves better prediction accuracy than competing network models when it comes to extracting nonlinear and temporal characteristics of network security scenarios, according to the experimental data.
ConclusionsIn addition, our method is perfect for tracking massive amounts of data transmitted by sensor networks because of its minimal time complexity and outstanding real-time performance.
-
-
-
Optimization of Graphene-based Antenna using Metasurface for THz Applications using Ensemble Learning models
Authors: Nipun Sharma and Amrit KaurAvailable online: 11 October 2024More LessAims and BackgroundThese days, communication is governed by scaled-down devices with extremely high data transfer rates. The days of data transfer rates in megabytes are long gone and the systems are touching data speeds of hundreds of gigabytes. To cater to this requirement, the evolution of metasurface-based antennas working in the THz frequency range is gaining pace.
Objectives and MethodologyMetasurface layers in antennas have unique mechanical and electrical properties that make them feasible. Graphene is a preferred metasurface material when designing antennas. In this paper, two novel designs of graphene-based metasurface antennas are proposed. These patch antennas with graphene metasurface layers have two configurations for slotted patches. Both graphene and gold-slotted patches are tested in this paper, and results are presented and validated for various performance parameters like return loss, peak gain, peak directivity, and radiation efficiency.
ResultsThe design of the proposed Graphene Patch Antennas (GPA) is done in HFSS, and once the design is complete, the data is collected for variations in antenna parameters and is further processed via machine learning for better convergence in terms of return loss using ensemble learning. Optimal tuning of antenna components like substrate length, patch length, slot width, etc., is done using two regressor algorithms viz Histogram-based Gradient Boosting Regression Tree (HBDT) and Random Forest Tree (RFT) in machine learning. The radiation efficiencies of the two designs presented in this work are 89.04%, 97.54%, an average radiation efficiency of of 93.29%. The bandwidth of the two antenna designs is 8.63 THz and 8.69 THz, respectively.
ConclusionExperimental results indicate that the proposed designs are achieved better bandwidth, and radiation efficiencies compared to state-of-art designs.
-
-
-
BER Analysis of Underlay Cooperative Cognitive Radio-based NOMA System
Authors: Meriem Ad and Abdellatif KhelilAvailable online: 09 October 2024More LessBackgroundThe integration of Cooperative Communications (CC), Cognitive Radio (CR) technology, and Non-Orthogonal Multiple Access (NOMA) techniques, termed Cooperative Cognitive Radio used NOMA (CCR-NOMA) systems, has emerged as a promising solution to address spectrum scarcity and connectivity challenges anticipated in sixth generation (6G) networks.
AimThis studyaims to investigate the Bit Error Rate (BER) performance of underlay CCR-NOMA systems.
MethodsWe derive precise closed-form expressions for BER at distant users under perfect and imperfect Channel State Information (CSI) conditions. These mathematical formulations are validated through Monte Carlo simulations.
ResultsOur results indicate that the near user 𝐶𝑈2 exhibits superior performance compared to the far user 𝐶𝑈2. Additionally, distant users utilizing the CCR-OMA protocol demonstrate better BER performance than those employing the CCR-NOMA protocol.
ConclusionThe presence of imperfect CSI adversely affects BER performance. Moreover, the derived closed-form expressions for BER in the investigated system align well with Monte Carlo simulations. These findings provide valuable insights for optimizing the performance of CCR-NOMA systems in real-world scenarios.
-
-
-
Detection of Intrusions in Internet of Things Based Deep Auto Encoder Using Deepnets
Authors: L. Godlin Atlas, K.V. Shiny, K.P. Arjun, N.M. Sreenarayanan and J. Lethisia NithiyaAvailable online: 26 September 2024More LessAims and backgroundAs a communication paradigm that bridges the gap between virtual and physical spaces, the Internet of Things (IoT) has quickly gained popularity in recent years. In order to supplement the provisions made by security protocols, a network-based intrusion detection system (IDS) has emerged as a standard component of network architecture. IDSs monitor and detect cyber threats continuously throughout the network lifetime.
Objectives and MethodsThe main contribution is the development of a two-level neural network model that optimizes the number of neurons and features in the hidden layers, achieving superior accuracy in anomaly detection. Its include the utilization of deep anomaly detection (DAD) to protect networks from unknown threats without requiring rule modifications. The research also emphasizes the importance of feature extraction and selection, employing parallel deep models for segmenting attacks. The proposed supervised technique enables simultaneous feature selection using parallel models, enhancing the accuracy of IDS designs. A novel hybrid technique combining Deep Auto Encoders (DAEs) and DeepNets is proposed for intrusion detection.
ResultsThe research present a data preprocessing stage, converting symbolic and quantitative data into real-valued vectors and normalizing them. Feature extraction involves utilizing DAEs to learn concise representations of datasets. The deep network architecture, including multilayer perceptrons and activation functions, is employed for feature extraction and classification. The proposed approach utilizes a DeepNets in the final stage in order to improve the rate of 97% accurate outputs and make it possible to achieve greatly accelerated execution durations.
ConclusionWhen measured against the performances of other approaches to the extraction of features, the performance of the deep network platform is superior.
-