Articles with "leveraging lstm" as a keyword



Photo by anniespratt from unsplash

Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.2018.1701270

Abstract: The evolution and sophistication of cyber-attacks need resilient and evolving cybersecurity schemes. As an emerging technology, the Internet of Things (IoT) inherits cyber-attacks and threats from the IT environment despite the existence of a layered… read more here.

Keywords: leveraging lstm; detection; fog things; lstm networks ... See more keywords