Today's article comes from the IET journal of Information Security. The authors are Morshedi et al., from Yazd University, in Iran. In this paper they incorporate the Hurst parameter into a hybrid CNN-LSTM model, that scans through IoT network traffic looking for anomalies.
DOI: 10.1049/ise2/6864273
You must be an active Journal Club member to access this content. If you're already a member, click the blue button to login. If you're not a member yet, click the sign-up button to get started.
Login to My Account
Sign Up