Attack Detection in Fog Layer for IIoT Based on Machine Learning Approach
- Finalized introduction
- Research more related works for IIoT,attack detecttion in fog layer
- Find the comparison between each algorithms
- Find the weakness from previous works that can implement for current research
-Research for more references
-Start writing section 2(realted works)
-Compare some previous works
-Continue paper writing
Capstone Design: IoT Application for Smart Home
- set up the environment
- assemble the components, raspberry pi and other sensors
- prepare the testbed
- make sure adafruit connectivity
- present weekly report in capstone design online class
-Prepare new concept of Smart home as Prof.Lee requested
-Adjust previous concept with new one
-Gather more information regarding new concept
-Prepare testbed for new concept with the existing devices
- Continue paper progress: 70%
- Getting used with research tools and environment
- More research references
- Publish 1 short-paper/journal
- Participate in local/international conference