<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="19707" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/19707?output=omeka-xml" accessDate="2026-04-05T15:30:49+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="171501">
              <text>Malicious Traffic Classification in WSN using Deep Learning Approaches</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="171502">
              <text>data routing; deep learning; LSTM; malicious transmission; neural network; Traffic data; transmission; WSN</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="171503">
              <text>Classifying malicious traffic in Wireless Sensor Networks (WSNs) is crucial for maintaining the network's security and dependability. Traditional security techniques are challenging to deploy in WSNs because they comprise tiny, resourceconstrained components with limited processing and energy capabilities. On the other hand, machine learning-based techniques, such as Deep Learning (DL) models like LSTMs, may be used to detect and categorize fraudulent traffic accurately. The classification of malicious traffic in WSNs is crucial because of security. To protect the network's integrity, data, and performance and ensure the system functions properly and securely for its intended use, hostile traffic categorization in WSNs is essential. Classifying malicious communication in a WSN using a Long Short-Term Memory (LSTM) is efficient. WSNs are susceptible to several security risks, such as malicious nodes or traffic that can impair network performance or endanger data integrity. In sequential data processing, LSTM is a Recurrent Neural Network (RNN) appropriate for identifying patterns in network traffic data.   2023 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="171504">
              <text>Gupta C.L.P.; Rajassekharan D.; Sharma D.K.; Elangovan M.; Myilsamy V.; Upreti K.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="171505">
              <text>2023 International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023, pp. 426-431.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="171506">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="171507">
              <text>2023-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="171508">
              <text>&lt;a href="https://doi.org/10.1109/ICCSAI59793.2023.10421081" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/ICCSAI59793.2023.10421081&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85186676858&amp;amp;doi=10.1109%2FICCSAI59793.2023.10421081&amp;amp;partnerID=40&amp;amp;md5=762c6b100dc43ac75453621713f8bba6" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85186676858&amp;amp;doi=10.1109%2fICCSAI59793.2023.10421081&amp;amp;partnerID=40&amp;amp;md5=762c6b100dc43ac75453621713f8bba6&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="171509">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="171510">
              <text>ISBN: 979-835036996-0</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="171511">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="171512">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="171513">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="171514">
              <text>Gupta C.L.P., Bansal Institute of Engineering and Technology, Dept. of Computer Science and Engineering, Lucknow, India; Rajassekharan D., Peninsula College, Faculty of Computer Science, Peninsula, Malaysia; Sharma D.K., Jaypee University of Engineering and Technology, Department of Mathematics, Madhya Pradesh, Guna, 473226, India; Elangovan M., K. S. Rangasamy College of Technology, Department of Artificial Intelligence and Data Science, Tamil Nadu, Tiruchengode, 637215, India; Myilsamy V., V.S.B College of Engineering Technical Campus, Department of Electrical and Electronics Engineering, Tamil Nadu, Coimbatore, 642109, India; Upreti K., CHRIST(Deemed to Be University), Department of Computer Science, Delhi-NCR, Ghaziabad, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
