-
Article
HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT
Critical Industries such as Manufacturing, Power, and Intelligent Transportation are increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter these cyberattacks, policymakers h...
-
Article
TMAP: A Threat Modeling and Attack Path Analysis Framework for Industrial IoT Systems (A Case Study of IoM and IoP)
Industrial cyber-physical systems (ICPS) are gradually integrating Information Technology (IT) and automating industrial processes, leading systems to become more vulnerable to malicious actors. Thus, to deplo...
-
Chapter and Conference Paper
An Enhancement in Accuracy for Breast Cancer Prediction Using Machine Learning and Deep Learning Model
As we are all aware, the population is growing rapidly in this modern period, placing a demand on the healthcare system to identify illnesses in the populace. This creates a major issue for eradicating large-s...
-
Chapter and Conference Paper
A Lightweight Intrusion Detection and Electricity Theft Detection System for Smart Grid
Smart grid systems have improved networking for power systems and many other industrial systems, but they still have many vulnerabilities, making them an easy target for cyber attacks. Recently, the number of ...
-
Chapter and Conference Paper
Exploring Object Centric Process Mining with MIMIC IV: Unlocking Insights in Healthcare
The vast Medical Information Mart for Intensive Care (MIMIC IV) dataset offers a goldmine for process mining in healthcare, yet traditional approaches often struggle with complex object interactions like patie...
-
Chapter and Conference Paper
Unveiling AI Efficiency: Loan Application Process Optimization Using PM4PY Tool
These days, financial institutions strive to streamline their loan processes for cost reduction, improved customer satisfaction, and enhanced overall efficiency. Process Mining (PM) offers a data-driven approa...
-
Article
Distributed hyperparameter optimization based multivariate time series forecasting
Various domains generate continuous data in the form of multivariate time series (MTS), including electricity and stock trading. It is difficult to maintain a low variance in forecasting error while forecastin...
-
Article
Motion-compensated online object tracking for activity detection and crowd behavior analysis
It is a nontrivial task to manage crowds in public places and recognize unacceptable behavior (such as violating social distancing norms during the COVID-19 pandemic). In such situations, people should avoid l...
-
Chapter and Conference Paper
Biometric Iris Identifier Recognition with Privacy Preserving Phenomenon: A Federated Learning Approach
As technology is getting advanced day by day, the concern of security, authentication, and identification are also becoming important in every domain. Apart from other identifiers used for authentication, a bi...
-
Chapter and Conference Paper
Anomaly Classification to Enable Self-healing in Cyber Physical Systems Using Process Mining
Industrial Cyber Physical Systems (CPS) are large-scale critical infrastructures that are vulnerable to cyberattacks with wide-ranging consequences. Being a combination of heterogeneous devices and protocols, ...
-
Chapter and Conference Paper
Generating Textual Description Using Modified Beam Search
Generating textual descriptions of images by describing them in words is a fundamental problem that connects computer vision and natural language processing. A single image may include several entities, their ...
-
Chapter and Conference Paper
A Short Survey of Elucidating the Emotion Recognition Methodologies Using Facial Images and EEG Signals
Since the high demand for Human–Computer Interaction (HCI), develo** an automated model for recognizing facial gestures or emotions becomes challenging. Some experts have used facial images as a constructive...
-
Chapter and Conference Paper
A Methodological Review of Time Series Forecasting with Deep Learning Model: A Case Study on Electricity Load and Price Prediction
Today, the world experiences a surge in adoption of renewable electricity generation methods. As a consequence to this, the dependence of electricity supply and demand has parallelly seen a dramatic increase o...
-
Chapter and Conference Paper
A Machine Learning Framework for Breast Cancer Detection and Classification
Breast cancer is a very frequently seen type of cancer. It is one of the biggest contributors to new cancer cases and death as shown by the world dataset, making it a major medical concern. This makes the rese...
-
Chapter and Conference Paper
Classification of Indoor–Outdoor Scene Using Deep Learning Techniques
Scene classification is a process in which a computer’s visualizations of a scene are mapped to segments. Then, the machine applies deep learning to do the task. Indoor scene classification is more challenging...
-
Chapter and Conference Paper
Commissioning Random Matrix Theory and Synthetic Minority Oversampling Technique for Power System Faults Detection and Classification
The fast paced innovation in communication and computation capabilities has laid the foundation of sophisticated transformation from legacy power systems to smart grid (SG) infrastructure. So, Providing the ef...
-
Article
A study on video semantics; overview, challenges, and applications
Due to the increase in surveillance systems, there is a massive increase in surveillance data. As of now, the key challenge for video surveillance systems is analyzing these large video clips. It, therefore, h...
-
Chapter and Conference Paper
Lane Detection for Autonomous Vehicle in Hazy Environment with Optimized Deep Learning Techniques
In this technological era, the devices are getting more intelligent and smarter with the advent of artificial intelligence and related technologies. The autonomous vehicle is one of the emerging and important...
-
Chapter and Conference Paper
Exploiting Vulnerabilities in the SCADA Modbus Protocol: An ICT-Reliant Perspective
Industrial plants like power, gas, water, and transport are controlled remotely and managed by a protocol like Modbus-TCP which has a significant contribution towards Industrial Control systems (ICS) and Super...
-
Chapter and Conference Paper
A Multi Agent Framework to Detect in Progress False Data Injection Attacks for Smart Grid
With the rapid growth in the use of the internet and the rapid digitization of the energy services, telecommunication and other critical infrastructures, there is a proportionate growth in the magnitude and th...