Distributed Attack Detection in Cloud Layer for IIoT Based on Machine Learning Approach
1. Read survey paper about attack detection in IIoT
2. Read applicable algorithm in attack detection topics
3. Start working on developing idea in introduction
1. Finalized Introduction
2. Research Random Forest algorithm implementation
3. Evaluated related search topics results
Capstone Design: IoT Application for Smart Home
1. Finalize on the choice of hardware for testbed
2. Finalize on the choice of protocols.
1. Design system model with MQTT protocol
2. Preparing the hardware parts
1. Continue paper progress: 70%
2. Getting used with research tools and environment
3. More research references
1. Publish 1 short-paper/journal
2. Participate in local/international conference