A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Porting and Execution of Anomalies Detection Models on Embedded Systems in IoT
2021
Proceedings of the International Conference on Internet-of-Things Design and Implementation
ACKNOWLEDGEMENT This publication has emanated from research supported in part by a research grant from Science Foundation Ireland (SFI) under Grant Number SFI/16/RC/3918 (Confirm) and also by a research ...
Demo Abstract: Porting and Execution of Anomalies Detection Models on Embedded Systems in IoT Bharath Sudharsan * , Pankesh Patel * , Abdul Wahid * , Muhammad Yahya * , John G. ...
In Figure 1 c-d, we provide the calculated SRAM and FLASH usage for B1-B4.
CONCLUSION In this demo, we showed how to port and execute anomaly detection models on MCU-based embedded systems. ...
doi:10.1145/3450268.3453513
fatcat:y2jgefwy6rg3zhqapg3hua45pu
DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System
2020
Applied Sciences
In this work, we develop a novel hybrid Deep Learning and Dendritic Cell Algorithm (DeepDCA) in the context of an Intrusion Detection System (IDS). ...
The experimentation results show that DeepDCA performed well in detecting the IoT attacks with a high detection rate demonstrating over 98.73% accuracy and low false-positive rate. ...
•Response-boxes (R blocks): these blocks execute in case an intrusion occurs.
Figure 1 . 1 General architecture for IDS systems-Source: [35] .
Figure 2 . 2 Attacks on IoT Layers. ...
doi:10.3390/app10061909
fatcat:wwm4hgbjdfhqxoe4vjdo6d5bcm
Multi-Technologies Network for IoT
2021
Zenodo
In short, this deliverable targets at explaining the state of the current technologies applied to internet-of-things (IoT) networks and the planned innovations of iNGENIOUS. ...
In particular, this deliverable covers three aspects of the network, namely, i) radio access network, ii) core network, and iii) slicing and orchestration. ...
An ENI system can be used to enhance and optimize the network slice management and control operations, leveraging active and passive monitoring services and network status information for anomaly detection ...
doi:10.5281/zenodo.4836190
fatcat:n2mbow4mfvdbxerghlspp3klke
D7.1 – Deployment Plan and Operational Framework
2021
Zenodo
D7.1 documents plan of activities for deploying ASSIST-IoT in pilot sites, including technical, organisational, and operational aspects. ...
Results of small-scale demonstrations are also reported, as well as integration of third parties ...
; global modelling of ISE, for deriving models of the fleet as whole as a function of the driving and use conditions; and local modelling and hypothesis test for fault detection, with the focus of detecting ...
doi:10.5281/zenodo.6777446
fatcat:kmjblgy5jfea3hpcedigff7du4
D6.2 – Testing and integration plan – Initial
2022
Zenodo
The initial release outlines the initial plan, while second version will include plan update and results. ...
Security agent runs at a host-level, combining anomaly and signature-based technologies to detect intrusions or software misuse.70%(docker-compose orchestration, tested on a virtual environment two use ...
Executive Summary This deliverable is written in the framework of WP6 -Testing, Integration and Support of ASSIST-IoT project under Grant Agreement No. 957258. ...
doi:10.5281/zenodo.6778046
fatcat:2yyv7duxevdz7hrqokqulteomu
Evaluating Performance of Containerized IoT Services for Clustered Devices at the Network Edge
2017
IEEE Internet of Things Journal
IoT applications are abstracted to the execution of specific tasks, which are deployed on embedded devices. ...
To produce a detailed snapshot of the evolution of this anomaly, the system must record the anomaly related engine values as soon as the malfunction is detected. ...
doi:10.1109/jiot.2017.2714638
fatcat:5k34jopmkbbzhge7xxwnnoi6mq
NOMS 2020 Author Index
2020
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium
Dividing Deep Learning Model for Continuous Anomaly Detection of In-
consistent ICT Systems (NOMS 2020 Poster Sessions, Tuesday, April 21,
2020, 13:00 -14:00)
Kenichi Nagaoka, National College of ...
(NOMS 2020 Technical Sessions, Tuesday, April 21, 2020,
11:00 -13:00)
Keishiro Watanabe, NTT
Dividing Deep Learning Model for Continuous Anomaly Detection of In-
consistent ICT Systems (NOMS 2020 Poster ...
doi:10.1109/noms47738.2020.9110412
fatcat:g5xipmrxgzc2bctaunnoqdvsdi
D2.2 System and Architecture Integration (Initial)
2021
Zenodo
The main purpose of this deliverable is to reach a common understanding of the project at a technical level among all consortium partners and those supporting the project from outside. ...
This document provides an overview of the iNGENIOUS cross-layer architecture. ...
Other interesting activities that could be executed in these devices are anomaly detection, firmware upgrade management of IoT devices, and video streaming. ...
doi:10.5281/zenodo.5746649
fatcat:odqysfiinjfkhjqmywrlbfssum
NOMS 2020 Full Program
2020
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium
Architecture for Cloud Network
Slices (NOMS 2020 Demos, Tuesday, April 21, 2020, 13:00 -14:00)
Andre Braga Reis, Instituto de Teleco-
municações
Physical Layer Anomaly Detection Mechanisms in IoT ...
He is a fellow of the IEEE and AAAS, and a past member of IFIP Committee on System Modeling and Optimization. ...
doi:10.1109/noms47738.2020.9110368
fatcat:nk5xudzdkrcbxil5u256aax5cy
rww_2020_program_book
2020
2020 IEEE 20th Topical Meeting on Silicon Monolithic Integrated Circuits in RF Systems (SiRF)
of High Pressure Physics PAS, Poland TU1C-2 Extended Equivalent Circuit Model for Enhanced Substrate Modeling of Three-Port Inductors S. ...
This year, WiS-Net2020 will focused on the latest developments in these areas including sensors and smart sensor networks ranging from UHF, RFID applications to millimeter-wave radar systems and six-port ...
In this special session, RF and microwave experts will give an insight in RF and microwave space engineering in general and in the field of cubesats in particular.
Buckhorn ...
doi:10.1109/sirf46766.2020.9040192
fatcat:gkx4hvivv5csvcvhykmgyusi2a
2020 IEEE Radio & Wireless Week
2020
2020 IEEE Topical Conference on RF/Microwave Power Amplifiers for Radio and Wireless Applications (PAWR)
of High Pressure Physics PAS, Poland TU1C-2 Extended Equivalent Circuit Model for Enhanced Substrate Modeling of Three-Port Inductors S. ...
This year, WiS-Net2020 will focused on the latest developments in these areas including sensors and smart sensor networks ranging from UHF, RFID applications to millimeter-wave radar systems and six-port ...
In this special session, RF and microwave experts will give an insight in RF and microwave space engineering in general and in the field of cubesats in particular.
Buckhorn ...
doi:10.1109/pawr46754.2020.9036006
fatcat:25yzg425wjg6xft32kusohlota
SHaRC 2020 Program Book
2020
2020 IEEE Space Hardware and Radio Conference (SHaRC)
of High Pressure Physics PAS, Poland TU1C-2 Extended Equivalent Circuit Model for Enhanced Substrate Modeling of Three-Port Inductors S. ...
This year, WiS-Net2020 will focused on the latest developments in these areas including sensors and smart sensor networks ranging from UHF, RFID applications to millimeter-wave radar systems and six-port ...
In this special session, RF and microwave experts will give an insight in RF and microwave space engineering in general and in the field of cubesats in particular.
Buckhorn ...
doi:10.1109/sharc47220.2020.9034040
fatcat:hljknbqpzvccjiwhrvyvpchihe
RWS 2020 Program Book
2020
2020 IEEE Radio and Wireless Symposium (RWS)
of High Pressure Physics PAS, Poland TU1C-2 Extended Equivalent Circuit Model for Enhanced Substrate Modeling of Three-Port Inductors S. ...
This year, WiS-Net2020 will focused on the latest developments in these areas including sensors and smart sensor networks ranging from UHF, RFID applications to millimeter-wave radar systems and six-port ...
In this special session, RF and microwave experts will give an insight in RF and microwave space engineering in general and in the field of cubesats in particular.
Buckhorn ...
doi:10.1109/rws45077.2020.9049986
fatcat:mgi2w3ya7jegpmrfvup2fnip6a
Artificial Intelligence-Driven Composition and Security Validation of an Internet of Things Ecosystem
2020
Applied Sciences
Key challenges in Internet-of-Things (IoT) system design and management include the secure system composition and the calculation of the security and dependability level of the final system. ...
We extend these techniques and apply the Event Calculus method for modelling the dynamic behavior of a system with progress in time. ...
in the field of heterogeneous embedded systems. ...
doi:10.3390/app10144862
fatcat:fnqj4v2rxjaubmduaseiveodie
SpaceCloud Cloud Computing and In-Orbit Demonstration
2021
Zenodo
using containerized and isolated virtualization either for execution locally or on networked spacecraft. ...
These requirements are compounded when factoring in the data movements planned for future spacecraft constellation mesh networks, i.e. connected spacecraft infrastructures for on-orbit fleet management ...
Business Space program under the ARTES framework and the ESA GSTP (General Support Technology Programme). ...
doi:10.5281/zenodo.5522871
fatcat:vio7fmyby5hltogkjatfxzdbse
« Previous
Showing results 1 — 15 out of 105 results