Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kaur, Baljeet
- Optimal Power Transmission for Various Spectrum Sharing Approaches in OFDM based Cognitive Radio Network
Abstract Views :133 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, I.K. Gujral Punjab Technical University, IN
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, IN
1 Department of Electronics and Communication Engineering, I.K. Gujral Punjab Technical University, IN
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, IN
Source
ICTACT Journal on Communication Technology, Vol 11, No 3 (2020), Pagination: 2228-2233Abstract
In context of effective resource utilization using spectrum sensing and dynamic spectrum access (DSA), Cognitive Radio (CR) has been proposed as versatile and an emerging technology. In order to understand, how OFDM is consider as suitable candidate for cognitive radio, this paper presents various aspects of Orthogonal Frequency Division Multiplexing (OFDM) based cognitive radio. As total transmission rate of CR user is maximized in interference constraint scenario, this paper also formulate problem for optimal transmit power control in OFDM based CR under various spectrum sharing approaches such as underlay, overlay and interweave. Apart from existing works in the literature here we presented mathematical formula for power-allocation schemes for interweave as well as joint underlay and overlay approach. MATLAB simulation shows that with optimal power transmission by CR users, capacity can be improved significantly.Keywords
Cognitive Radio, Overlay, Underlay, Interweave, Optimal Power.- LONG REACH DUAL POLARIZATION 128-QAM SYSTEM WITH DISPERSION/ NONLINEAR COMPENSATION USING OPTICAL BACK PROPAGATION
Abstract Views :260 |
PDF Views:112
Authors
Affiliations
1 Guru Nanak Dev Engineering College, IN
1 Guru Nanak Dev Engineering College, IN
Source
ICTACT Journal on Communication Technology, Vol 12, No 2 (2021), Pagination: 2414-2417Abstract
Optical network systems with prolonged reach are required to cater the long distance located optical network units (subscribers). In this work, a DP-128 QAM based system is proposed with Optical Back Propagation (OBP) to cope up with nonlinear impairments in wavelength division multiplexed (WDM) systems. OBP module that consists of optical phase conjugator (OPC), Raman fiber amplifier (RFA) and erbium doped fiber amplifier (EDFA) is investigated in pre, post and symmetrical configuration. Ideal OBP conditions are simulated using Dispersion Compensation Fiber (DCF) as a RFA with dual directional pumping. Dual directional pumping shows better result than forward and backward pumping. Results revealed that system can cover 5100 km within acceptable BER (10-3) using symmetrical OBP with RFA dual bi-directional pumping. Proposed symmetrical OBP system provides enhanced performance as compared to other techniques such as single channel digital back propagation (DBP), wideband DBP, pre OBP with forward pumping, pre OBP with backward pumping, pre OBP with dual directional pumping, and post OBP with dual directional pumping.References
- G.P. Agrawal, “Nonlinear Fiber Optics”, 5 th Edition, Academic Press, 2012.
- J.P. Gordon and L.F. Mollenauer, “Phase Noise in Photonic Communications Systems using Linear Amplifiers”, Optics Letters, Vol. 15, No. 23, pp. 1351-1353, 1990.
- K. Roberts, C. Li, L. Strawczynski, M. O’Sullivan and I. Hardcastle, “Electronic Precompensation of Optical Nonlinearity”, IEEE Photonics Technology Letters, Vol. 18, No. 2, pp. 403-405, 2006.
- D. Pepper and A. Yariv, “Compensation for Phase Distortions in Nonlinear Media by Phase Conjugation”, Optics Letters, Vol. 5, No. 2, pp. 59-60, 1980.
- B. Foo, B. Corcoran, C. Zhu and A.J. Lowery, “Distributed Nonlinear Compensation of Dual-Polarization Signals using Optoelectronics”, IEEE Photonics Technology Letters, Vol. 28, No. 20, pp. 2141-2144, 2016.
- E. Mateo, L. Zhu and G. Li, “Impact of XPM and FWM on the Digital Implementation of Impairment Compensation for WDM Transmission using Backward Propagation”, Optics Letters, Vol. 16, No. 20, pp. 16124-16137, 2008.
- X. Liang and S. Kumar, “Optical Back Propagation for Compensating Nonlinear Impairments in Fiber Optic Links with ROADMs”, Optics Letters, Vol. 24, No. 20, pp. 22682- 22692, 2016.
- X. Li, X. Chen, G. Goldfarb, E. Mateo, I. Kim, F. Yaman and G. Li, “Electronic Post-Compensation of WDM Transmission Impairments using Coherent Detection and Digital Signal Processing”, Optics Express, Vol. 16, No. 2, pp. 880-888, 2008.
- X. Liang, S. Kumar and J. Shao, “Ideal Optical Backpropagation of Scalar NLSE using Dispersion Decreasing Fibers for WDM Transmission”, Optics Express, Vol. 21, No. 23, pp. 28668-28675, 2013.
- D. Pepper and A. Yariv, “Compensation for Phase Distortions in Nonlinear Media by Phase Conjugation”, Optics Letters, Vol. 5, No. 2, pp. 59-60, 1980.
- S. Watanabe and M. Shirasaki, “Exact Compensation for both Chromatic Dispersion and Kerr Effect in a Transmission Fiber using Optical Phase Conjugation”, Journal of Lightwave Technology, Vol. 14, No. 3, pp. 243- 248, 1996.
- P. Minzioni, I. Cristiani, V. Degiorgio, L. Marazzi, M. Martinelli, C. Langrock and M.M. Fejer, “Experimental Demonstration of Nonlinearity and Dispersion Compensation in an Embedded Link by Optical Phase Conjugation”, IEEE Photonics Technology Letters, Vol. 18, No. 9, pp. 995-997, 2006.
- T.J. Xia, G.A. Wellbrock, Ming-Fang Huang, Shaoliang Zhang, Yue-Kai Huang, Do-Il Chang, S. Burtsev, W. Pelouch, E. Zak, H. de Pedro, W. Szeto and H. Fevrier, “Transmission of 400g pm-16qam Channels over Long Haul Distance with Commercial All-Distributed Raman Amplification System and Aged Standard Smf in Field”, Proceedings of International Conference on Optical Fiber Communication, pp. 1-3, 2014.
- M. A. Iqbal, M. Tan and P. Harper, “On the Mitigation of RIN Transfer and Transmission Performance Improvement in Bidirectional Distributed Raman Amplifiers”, Journal of Lightwave Technology, Vol. 36, No. 13, pp. 2611-2618, 2018.
- H.M. Wang, W.T. Shih and H. Taga, “Single Fiber Based 10.66 gb/s Bidirectional Long Reach WDM-PON Supported by Distributed Raman Amplifier”, Proceedings of Joint Conference on Opto-Electronics and Communications, pp. 1-2, 2008.
- E. Bidaki and S. Kumar, “A Raman-Pumped Dispersion and Nonlinearity Compensating Fiber for Fiber Optic Communications”, IEEE Photonics Technology Letters, Vol. 12, No. 1, pp. 1-17, 2019.
- HYBRID SHARING AND POWER ALLOCATION USING WATERFILLING ALGORITHM FOR MIMO-OFDM BASED COGNITIVE RADIO NETWORK
Abstract Views :213 |
PDF Views:119
Authors
Affiliations
1 I.K. Gujral Punjab Technical University, IN
2 Guru Nanak Dev Engineering College, IN
1 I.K. Gujral Punjab Technical University, IN
2 Guru Nanak Dev Engineering College, IN
Source
ICTACT Journal on Communication Technology, Vol 12, No 2 (2021), Pagination: 2402-2406Abstract
In order to optimize power allocation, Orthogonal frequency division multiplexing (OFDM) based cognitive radio (CR) network allows flexible spectrum and adaptive capability. Decreased capacity due to subcarrier cancelation and out of band reduction can be compensated while employing multiple inputs and multiple outputs (MIMO) along with OFDM based CR. MIMO allows better beam forming and directivity due to multiple transmit and receive antenna. Here we have implemented water filling mechanism with channel state information (CSI) for optimal power allocation under hybrid spectrum sharing scenario such as overlay, underlay and interweave. Main objective is to maximize overall capacity of cognitive radio network in downlink while considering interference constraint imposed by primary user and maximum transmit power constraint at secondary user. Simulation results demonstrate waterfilling approach for hybrid scenario in MIMO-OFDM based CRN.References
- Federal Communications Commission, “Spectrum Policy Task Force”, Available at: https://www.fcc.gov/document/spectrum-policy-task-force, Accessed at 2002.
- J. Mitola and G.Q. Maguire, “Cognitive Radio: Making Software Radios More Personal”, IEEE Communications Magazine, Vol 6, No.4, pp. 13-18, 1999.
- S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications”, IEEE Journal on Selected Areas in Communications, Vol. 23, No. 2, pp. 201-220, 2005.
- F. Akyildiz, W.Y. Lee, M. C. Vuran and S. Mohanty, “Next Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey”, Computer Networks, Vol. 50, No. 13, pp. 2127-2159, 2006.
- R. V. Nee and R. Prasad, “OFDM for Wireless Multimedia Communication”, Artech House, 2000.
- B. FarhangvBoroujeny and R. Kempter, “Multicarrier Communication Techniques for Spectrum Sensing and Communication in Cognitive Radios”, IEEE Communications Magazine, Vol. 46, No. 4, pp. 80-85, 2008.
- U. Berthold, F. Jondral, S. Brandes and M. Schnell, “OFDM-Based Overlay Systems: A Promising Approach for Enhancing Spectral Efficiency”, IEEE Communications Magazine, Vol. 45, No. 12, pp. 52-58, 2007.
- D. Bepari and D. Mitra, “Improved Power Loading Scheme for Orthogonal Frequency Division Multiplexing based Cognitive Radio”, IET Communications, Vol. 9, No. 16, pp. 2033-2040. 2015.
- H. Yamaguchi, “Active Interference Cancellation Technique for MB-OFDM Cognitive Radio”, Proceedings of European Conference on Microwave, pp. 1105-1108, 2004.
- S. Brandes, I. Cosovic and M. Schnell, “Reduction of Outof-Band Radiation in OFDM Systems by Insertion of Cancellation Carriers,” IEEE Communication Letters, Vol 10, No.6, pp. 420-422, 2006.
- A. J. Paulraj, “An Overview of MIMO communications-A Key to Gigabit Wireless”, Proceedings of the IEEE, Vol. 92, No. 2, pp. 198-218, 2004.
- D. Gesbert, M. Shafi, D. Shiu, P.J. Smith and A. Naguib, “From Theory to Practice: An Overview of MIMO SpaceTime Coded Wireless Systems,” IEEE Journal on Selected Areas in Communications, Vol. 21, No. 3, pp. 281-302, 2003. [13] H. Bolcskei and E. Zurich, “MIMO-OFDM Wireless Systems: Basics, Perspectives, and Challenges”, IEEE Wireless Communications, Vol. 13, No. 4, pp. 31-37, 2006.
- W. Zhang, X.G. Xia and K.B. Letaief, “Space Time/Frequency Coding for MIMO-OFDM in Next Generation Broadband Wireless System”, IEEE Wireless Communication, Vol. 14, No. 3, pp. 32-43, 2007.
- D. Zhang, Z. Tian and G. Wei, “Spatial Capacity of Narrowband vs. Ultra-Wideband Cognitive Radio Systems”, IEEE Transactions on Wireless Communications, Vol. 7, No. 11, pp. 4670-4680, 2008.
- M. G. Khoshkholgh, K. Navaie and H. Yanikomeroglu, “On the Impact of the Primary Network Activity on the Achievable Capacity of Spectrum Sharing over Fading Channels”, IEEE Transactions on Wireless Communications, Vol. 8, No. 4, pp. 2100-2111, 2009.
- Kuldeep Kumar and Manwinder Singh, “Proposed Water Filling Model in a MIMO System”, International Journal of Emerging Technology and Advanced Engineering, Vol. 1, No. 2, pp. 1-12, 2011.
- S. Wang, W. Shi and C. Wang, “Energy-Efficient Resource Management in OFDM Based Cognitive Radio Networks under Channel Uncertainty”, IEEE Transactions on Communications, Vol. 63, No. 9, pp. 3092-3102, 2015.
- A. Goldsmith, S.A. Jafar, I. Maric and S. Srinivasa, “Breaking Spectrum Gridlock with Cognitive Radios: An Information Theoretic Perspective”, Proceedings of the IEEE, Vol. 97, No. 5, pp. 894-914, 2009.
- Z. Wu and B. Natarajan, “Interference Tolerant Agile Cognitive Radio: Maximize Channel Capacity of Cognitive Radio”, Proceedings of International Conference on Consumer Communications and Networking, pp. 1027- 1031, 2007.
- Y.J. Jang and K.B. Letaief, “An Efficient Resource Allocation Scheme for Spatial Multiuser Access in MIMOOFDM/OFDM Systems”, IEEE Transactions on Information Theory, Vol. 53, No. 1, pp. 107-116, 2005.
- T. Weiss, J. Hillenbrand, A. Krohn and F.K. Jondral, “Mutual Interference in OFDM Based Spectrum Pooling Systems”, Proceedings of International Conference on IEEE Vehicular Technology, pp. 1873-1877, 2004.
- G. Bansal, M.J. Hossain and V.K. Bhargava, “Optimal and Suboptimal Power Allocation Schemes for OFDM-Based Cognitive Radio Systems”, IEEE Transactions on Wireless Communications, Vol. 7, No. 11, pp. 4710-4718, 2008.
- G. Bansal, M.J. Hossain, V.K. Bhargava and T. Le-Ngoc, “Subcarrier and Power Allocation for OFDMA-Based Cognitive Radio Systems with Hybrid Overlay and Underlay Spectrum Access Mechanism”, IEEE Transactions on Vehicular Technology, Vol. 62, No. 3, pp. 1111-1122, 2013.
- M.R. Bharti and D. Ghosh, “Hybrid Spectral Shaping and Power Loading for OFDM based Cognitive Radio”, Proceedings of International Conference on Advanced Networks and Telecommunications Systems, pp. 1-6, 2016.
- Qilin Qi, Andrew Minturn and Yaoqing Yang, “An Efficient Water-Filling Algorithm for Power Allocation in OFDMBased Cognitive Radio System”, Proceedings of International Conference on Systems and Informatics, pp. 2069-2073, 2012.
- E. Bedeer, O.A. Dobre, M.H. Ahmed and K.E. Baddour, “A Novel Algorithm for Rate/Power Allocation in OFDM Based Cognitive Radio Systems with Statistical Interference Constraints”, Proceedings of International Conference on Global Communications, pp. 3504-3509, 2013.
- S Shahraki, K. Mohamed-Pour and L. Vangelista, “Sum Capacity Maximization for MIMO-OFDMA based Cognitive Radio Networks”, Physical Communication, Vol. 10, pp. 106-115, 2014.
- S. Boyd and L. Vandenberghe, “Convex Optimization”, Cambridge University Press, 2004.
- Home Network Security Incorporating Machine Learning Algorithms In Internet Of Medical Things
Abstract Views :120 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, IN
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, IN
3 Department of Informatics, Federal Institute of Education, Science, and Technology of São Paulo, BR
1 Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, IN
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, IN
3 Department of Informatics, Federal Institute of Education, Science, and Technology of São Paulo, BR
Source
ICTACT Journal on Communication Technology, Vol 12, No 4 (2021), Pagination: 2562-2566Abstract
The proliferation of chronic disorders such as COVID-19 has recognized the importance of people all over the world having immediate access to healthcare. The recent pandemic has shown deficiencies in the traditional healthcare infrastructure, namely that hospitals and clinics alone are inadequate for grappling with such a disaster. One of the key technologies that favours new healthcare solutions is smart and interconnected wearables. Thanks to developments in the Internet of Things (IoT), these wearables will now collect data on an unprecedented scale. However, as a result of their extensive use, security in these critical systems has become a major concern. This paper presents an intrusion detection mechanism based on Machine Learning Algorithms for healthcare applications used in home network environments. Experiments are carried out on a home network to detect attacks against a health care application. Experiments using the proposed mechanism based on Machine Learning algorithms to detect attacks against a healthcare application are carried out on a home network, and the results show a good performance of the used algorithms.Keywords
IoMT, Security, Smart Watch, IDSReferences
- D. Koutras, G. Stergiopoulos, T. Dasaklis, P. Kotzanikolaou, D. Glynos and C. Douligeris, “Security in IoMT Communications: A Survey”, Sensors, Vol. 20, No. 17, pp. 4828-4848, 2020.
- F. Alsubaei, A. Abuhussein and S. Shiva, “Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment”, Proceedings of IEEE 42nd International Conference on Local Computer Networks, pp. 112-120, 2017.
- S. S. Hameed, “A Systematic Review of Security and Privacy Issues in the Internet of Medical Things; the Role of Machine Learning Approaches”, Computer Science, Vol. 7, No. 4, pp. 44-56, 2021.
- M. Papaioannou “A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)”, Emerging Telecommunications Technologies, Vol. 23, pp. 1-12, 2020.
- A. Hockey, “Uncovering the Cyber Security Challenges in Healthcare”, Network Security, Vol. 2020, No. 4, pp. 18-19, 2020.
- G. Thamilarasu, A. Odesile and A. Hoang, “An Intrusion Detection System for Internet of Medical Things”, IEEE Access, Vol. 8, pp. 181560-181576, 2020.
- G. Hatzivasilis, O. Soultatos, C. Verikoukis, G. Demetriou, C.I. Tsatsoulis and N. Systems, “Review of Security and Privacy for the Internet of Medical Things (IoMT)”, Proceedings of IEEE 42nd International Conference on Distributed Computing in Sensor Systems, pp. 1-8, 2019.
- J.J. Hathaliya and S. Tanwar, “An Exhaustive Survey on Security and Privacy Issues in Healthcare 4.0,” Computer Communications, Vol. 153, pp. 311-335, 2020.
- H.K. Bharadwaj, A. Agarwal, V. Chamola, V. Hassija, M. Guizani and B. Sikdar, “A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications”, Proceedings of IEEE International Conference on AI and IoT for Smart Health, pp. 32-45, 2021.
- A.I. Newaz, A.K. Sikder, M.A. Rahman and A.S. Uluagac, “HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems”, Proceedings of IEEE International Conference on Social Networks Analysis, Management and Security, pp. 389-396, 2019.
- L. Xiao, X. Wan, X. Lu, Y. Zhang and D. Wu, “IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?”, IEEE Signal Processing Magazine, Vol. 35, No. 5, pp. 41-49, 2018.
- E. Adi, A. Anwar, Z. Baig and S. Zeadally, “Machine Learning and Data Analytics for the IoT”, Neural Computing and Applications, Vol. 32, No. 20, pp. 1620516233, 2020.
- S.M. Tahsien, H. Karimipour and P. Spachos, “Machine Learning based Solutions for Security of Internet of Things (IoT): A Survey”, Journal of Network and Computer Applications, Vol. 161, pp. 1-13, 2020.
- M. Hasan, M.M. Islam, M.I.I. Zarif and M.M.A. Hashem, “Attack and Anomaly Detection in IoT Sensors in IoT Sites using Machine Learning Approaches”, Internet of Things, Vol. 7, pp. 1-19, 2019.
- A.A. Hady, A. Ghubaish, T. Salman, D. Unal and R. Jain, “Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study”, IEEE Access, Vol. 8, pp. 106576-106584, 2020.
- Openargus-Home, Available at https://openargus.org/, Accessed at 2021.
- Pearson Correlation an Overview, Available at https://www.sciencedirect.com/topics/computerscience/pearson-correlation, Accessed at 2021.
- Cybersecurity In IIOT And IOMT Networks Using Machine Learning Algorithms - A Survey
Abstract Views :123 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, IN
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, IN
3 Department of Informatics, Federal Institute of Education, Science, and Technology of São Paulo, BR
1 Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, IN
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, IN
3 Department of Informatics, Federal Institute of Education, Science, and Technology of São Paulo, BR
Source
ICTACT Journal on Communication Technology, Vol 12, No 4 (2021), Pagination: 2577-2581Abstract
Rapid advancements in micro-computing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have allowed for innovative Internet of Things (IoT) solutions to redefine numerous networking applications. With the emergence of IoT branches such as the Internet of Medical Things (IoMT) and the Industrial Internet of Things (IIoT), healthcare and industrial systems have been changed by IoT. This paper presents an overview of the technologies that are being used to secure IoMT as well as IIoT frameworks seen within the research articles.Keywords
Machine Learning, Healthcare, Cybersecurity, Internet of Things (IoT)References
- Modbus, “The Modbus Organization”, Available at https://modbus.org/, Accessed at 2021.
- Bacnet, “BACnet Website”, Available at http://www.bacnet.org/, Accessed at 2021.
- DNP, “Overview of DNP3 Protocol”, Available at https://www.dnp.org/About/Overview-of-DNP3-Protocol, Accessed at 2021.
- MQTT, “MQTT - The Standard for IoT Messaging”, Available at https://mqtt.org/, Accessed at 2021.
- IEEE Standards, “IEEE SA - The IEEE Standards Association - Home”, Available at https://standards.ieee.org/, Accessed at 2021.
- A. Antonini, A. Barenghi, G. Pelosi and S. Zonouz, “Security Challenges in Building Automation and SCADA”, Proceedings of International Carnahan Conference on Security Technology, pp. 1-6, 2014.
- Cypress Perform, Available at “Bluetooth Low Energy (BLE)”, Available at https://www.infineon.com/dgdl/InfineonComponent_BLE_V2.0Software%20Module%20Datasheets-v03_66EN.pdf?fileId=8ac78c8c7d0d8da4017d0eae085e299e, Accessed at 2015.
- Texas Instruments, “Bluetooth low energy Protocol Stack Introduction”, Available at http://softwaredl.ti.com/lprf/simplelink_cc2640r2_sdk/1.00.00.22/exports/ docs/blestack/html/blestack/index.html#:~:text=The%20Bluetooth%20low%20en ergy%20protocol%20stack%20(or%20protocol%20stack) %20consists,two%20sections%20are%20implemented%20 separately, Accessed at 2021.
- C.T. Lin, S.L. Wu and M.L. Lee, “Cyber Attack and Defense on Industry Control Systems”, Proceedings of IEEE International Conference on Dependable and Secure Computing, pp. 1-3, 2017.
- M. Almseidin, M. Alzubi, S. Kovacs and M. Alkasassbeh, “Evaluation of Machine Learning Algorithms for Intrusion Detection System”, Proceedings of IEEE 15th International Symposium on Intelligent Systems and Informatics, pp. 277282, 2017.
- L. Rosa, T. Cruz, P. Simoes, E. Monteiro and L. Lev, “Attacking SCADA Systems: A Practical Perspective”, Proceedings of IEEE International Conference on Integrated Network and Service Management, pp. 741-746, 2017.
- A. Keliris, H. Salehghaffari, B. Cairl, P. Krishnamurthy, M. Maniatakos and F. Khorrami, “Machine Learning-Based Defense against Process-Aware Attacks on Industrial Control Systems”, Proceedings of IEEE International Conference on Integrated Networks, pp. 1-10, 2016.
- F. Jiang, “Deep Learning based Multi-Channel Intelligent Attack Detection for Data Security”, IEEE Transactions on Sustainable Computing, pp. 1-10, 2018.
- M. Zolanvari, M.A. Teixeira, L. Gupta, K.M. Khan and R. Jain, “Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things”, IEEE Internet of Things, Vol. 6, No. 4, pp. 6822-6834, 2019.
- M. Teixeira, T. Salman, M. Zolanvari, R. Jain, N. Meskin and M. Samaka, “SCADA System Testbed for Cybersecurity Research using Machine Learning Approach”, Future Internet, Vol. 10, No. 8, pp. 76-88, 2018.
- G. Hatzivasilis, O. Soultatos, S. Ioannidis, C. Verikoukis, G. Demetriou and C. Tsatsoulis, “Review of Security and Privacy for the Internet of Medical Things (IoMT)”, Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems, pp. 457-464, 2019.
- A. Jain, T. Singh and S. Kumar Sharma, “Security as a Solution: An Intrusion Detection System using a Neural Network for IoT Enabled Healthcare Ecosystem”, Interdisciplinary Journal of Information, Knowledge, and Management, Vol. 16, pp. 331-369, 2021.
- P. Kumar, G.P. Gupta and R. Tripathi, “An Ensemble Learning and Fog-Cloud Architecture-Driven Cyber-Attack Detection Framework for IoMT Networks”, Computer Communications, Vol. 166, pp. 110-124, 2021.
- E.M. Campos, “Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges”, Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems, pp. 1-13, 2021.