MbrlCatalogueTitleDetail

Do you wish to reserve the book?
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks
Journal Article

Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks

2024
Request Book From Autostore and Choose the Collection Method
Overview
The Internet of Things (IoT) network is a fast-growing technology, which is efficiently used in various applications. In an IoT network, the massive amount of connecting nodes is the existence of day-to-day communication challenges. The platform of IoT uses a cloud service as a backend for processing information and maintaining remote control. To manage the developing intricacy of cyberattacks, it is critical to have an effectual intrusion detection system (IDS), which can monitor computer sources and create data on suspicious or abnormal actions. The IoT network’s security can progressively become a critical concern as IoT technology obtains extensive use. Protecting IoT systems with traditional IDS is challenging due to the vast variety and volume of IoT devices. Currently, Machine Learning (ML) and Deep Learning (DL) techniques are utilized to address the security threats in IoT networks. This manuscript proposes a Cybersecurity through an Attention-based Stacked Autoencoder with a Pelican Optimization Algorithm for the Detection and Mitigation of Attacks (CASAE-POADMA) methodology on an IoT-assisted network. The main purpose of the CASAE-POADMA methodology is to identify and mitigate the presence of cybersecurity attack behavior in the IoT-assisted network. At first, the presented CASAE-POADMA approach utilizes min–max normalization to scale input data into a uniform design. Besides, the greylag goose optimization (GGO) method is employed for the feature selection process. For the detection and mitigation of attack, the presented CASAE-POADMA approach employs the attention-based stacked autoencoder (ASAE) method. Eventually, the hyperparameter tuning of the ASAE method is executed by using pelican optimization algorithm (POA) method. The simulation validation of the CASAE-POADMA approach is verified under a benchmark database. The experimental validation of the CASAE-POADMA approach exhibited a superior accuracy value of 99.50% over existing techniques.