Distributed Attack Detection in Cloud Layer for IIoT Based on Machine Learning Approach
- Finalized research topic
- Research papers/journals/articels about attack detection in IIoT
- Change Title & Abstract
- Read survey paper about attack detection in IIoT
- Read applicable algorithm in attack detection topics
- Start working on developing idea in introduction
Capstone Design: IoT Application for Smart Home
- Find more reference regarding smart home's protocol
- Minimize scope of work
- Focus research in MQTT protocol only
- How to use MQTT protocol and implement it in IoT project
- Continue paper progress: 70%
- Getting used with research tools and environment
- More research references
- Finish 1 paper
- Participate in local/international conference