Professional Documents
Culture Documents
Final E-Commerce Risk (3)
Final E-Commerce Risk (3)
MASTER OF TECHNOLOGY
in
HEALTH, SAFETY AND ENVIRONMENT
Submitted by
KARTHIKEYAN A
500104683
UPES, DEHRADUN
APRIL 2024
UNIVERSITY OF PETROLEUM AND ENERGY STUDIES,
DEHRADUN
BONAFIDE CERTIFICATE
Certified this title “Managing Risk In E-Commerce Industry With The Help Of BBS” is a
bona-fide work of KARTHIKEYAN A (500104683) who carried out the work under my
supervision. Certified further that to my best knowledge the work under my supervision.
Certified further that to my best knowledge the work reported herein does not form part of any
other thesis or decertation on which a degree or award was conferred on an earlier occasion on
this or any other candidate.
Sustainability Cluster
DECLARATION
The author declares that the thesis titled “Managing Risk In E-Commerce Industry With The
Help Of BBS” submitted for partial fulfilment of Master of Technology in Health, Safety and
Environment. Science is the record of research work carried out by the author during the academic
year 2022-2024 under the able guidance of Dr.Bikarama Prasad Yadav and has not formed
the basis for awarding any degree, diploma, associateship, fellowship, titles at this or any other
university or other institution of higher learning.
The author further declares that the materials obtained from all sources have been duly
acknowledged in the report. The author shall be solely responsible for plagiarism or other
irregularities in the report.
This report comprises of the final document associated to the postgraduate final dissertation;
“Managing Risk In E-Commerce Industry With The Help Of BBS”. The report consists of
ten chapters, of which a brief outline of the content is presented below.
The report starts with the exploration of Managing Risk in the E-commerce Industry through the
lens of Behavior-Based Security (BBS). In the fast-paced world of online commerce, risks
abound, from cyber threats to supply chain disruptions. This preface sets the stage for a focused
examination of how BBS revolutionizes risk management by dynamically responding to user
behavior. Join this conversation as we dissect real-world challenges, showcase industry best
practices, and empower e-commerce professionals to navigate the ever-evolving digital landscape.
Together, let's unravel the threads of uncertainty, fortify our defenses, and usher in a new era of
resilience in the dynamic world of e-commerce.
KARTHIKEYAN A
Sustainability Cluster
School of Advanced Engineering
UPES
Dehradun
ACKNOWLEDGMENT
The author wishes to express their sincerest gratitude towards the UPES, Dehradun for providing
the opportunity, skills and knowledge to pursue this scientific work. The author expresses his
heartfelt gratitude to Dr . Bikarama Prasad Yadav for their constant and valuable guidance without
whom this research could not have been possible.
Dr . Bikarama Prasad Yadav helped the author in creating a scientific temperament along with the
necessary skills and knowledge which enabled in the completion of this project. His motivational
and supportive presence along with his constant longing for excellence and conducting impactful
research was most certainly the biggest inspiration for this research. The author would like to thank
Dr . Bikarama Prasad Yadav as their contribution was pivotal as course instructors during the
M.Tech.
The author would like to thank all the academic and administrative staff at UPES, Dehradun who
helped in maintaining a conducive research atmosphere in the institute.
Finally, the author expresses his heartfelt thanks to his parents who have always supported his ideas
and journey even when they did not approve of them.
KARTHIKEYAN A (R080222003)
Sustainability Cluster
School of Advanced Engineering
UPES
Dehradun
Table of Contents
Chapter – 1 ............................................................................................................................................ 8
Introduction ........................................................................................................................................... 8
1.1 Introduction :..................................................................................................................................... 8
1.2Statement of proposal : ...................................................................................................................... 8
1.3 Background of the study : ................................................................................................................ 8
1.4 Problem Statement: ........................................................................................................................... 8
1.5 Objectives of the Study: .................................................................................................................... 9
1.6 Motivation of the Study: ................................................................................................................... 9
1.7 Scope of the Study: ........................................................................................................................... 9
Chapter – 2 .......................................................................................................................................... 10
Literature Review ............................................................................................................................... 10
Chapter – 3 .......................................................................................................................................... 12
SYSTEM ANALYSIS ......................................................................................................................... 12
Chapter – 4 .......................................................................................................................................... 13
SOFTWARE SPECIFCATION......................................................................................................... 13
4.1 Hardware Requirement: .................................................................................................................. 13
4.2 Software Requirement: ................................................................................................................... 13
SOFTWARE DESCRIPTION ........................................................................................................... 14
5.1 PYTHON: ....................................................................................................................................... 14
5.2 FEATURES OF PYTHON: ............................................................................................................ 14
5.3 PORTABLE: ................................................................................................................................... 15
5.4 FEASIBILITY STUDY: ................................................................................................................. 18
Chapter – 6 .......................................................................................................................................... 19
METHODOLOGY ............................................................................................................................. 19
Chapter – 7 .......................................................................................................................................... 21
SYSTEM IMPLEMENTATION ....................................................................................................... 21
Chapter – 8 .......................................................................................................................................... 23
APPENDIX .......................................................................................................................................... 23
8.1 OUTPUT:........................................................................................................................................ 23
8.2 SCREENSHOT: .............................................................................................................................. 33
Chapter – 9 .......................................................................................................................................... 34
RESULTS & DISCUSSION............................................................................................................... 34
Chapter - 10 ......................................................................................................................................... 35
CONCLUSION AND FUTURE ENHACEMENT .......................................................................... 35
10.1 CONCLUSION: ............................................................................................................................ 35
10.2 SCPOE IN FUTURE: ................................................................................................................... 35
Chapter – 11 ........................................................................................................................................ 37
REFERENCE ...................................................................................................................................... 37
11.1 REFERENCE:............................................................................................................................... 37
Chapter – 1
Introduction
1.1 Introduction :
1.2Statement of proposal :
E-commerce has made shopping and business easier, but it also comes with risks like
cybersecurity, payment issues, and more. This proposal suggests using Behavior-Based
Security (BBS) in e-commerce to detect and stop unusual behavior from users, devices, and
apps. BBS helps improve cybersecurity and lowers the risk of problems, making e-commerce
safer and more successful.[3].
The study looks into how Behavior-Based Security (BBS) can help manage risks in e-
commerce. BBS focuses on spotting unusual behavior in systems instead of just following
traditional security rules. With e-commerce facing more cyber threats like fraud and data
breaches, the study will review how BBS is used in e-commerce, including challenges and
successes. It will use both qualitative (like reviewing literature) and quantitative (like surveying
e-commerce companies) methods to understand and suggest ways for e-commerce businesses
to use BBS effectively. The study will also highlight areas for future research in this area.[4].
The escalating prevalence of cyber threats in e-commerce has prompted a search for
effective solutions, with behavior-based safety (BBS) emerging as a promising approach. This
study aims to offer recommendations for implementing BBS in the context of e-commerce
cybersecurity. By analyzing the benefits of BBS, such as its ability to target human behavior
vulnerabilities and proactively reduce risks, this study seeks to provide actionable insights for
organizations looking to strengthen their cybersecurity defenses and safeguard sensitive data
in the ever-evolving digital landscape.[4]
The project improves network performance, security, and compliance with input from
administrators, analysts, and executives. It uses tools like packet sniffers and analysis
techniques, follows security standards like GDPR and HIPAA, and communicates findings
through reports, all guided by a detailed plan.
Chapter – 2
Literature Review
Privacy concerns represent another critical facet of risk in e-commerce. The collection,
storage, and utilization of customer data must adhere to stringent privacy regulations such as
the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act
(CCPA). Mishandling data, unauthorized access, or non-compliance with privacy regulations
can result in severe penalties, reputational damage, and erosion of customer trust [8].
Furthermore, fraudulent activities, including payment fraud, identity theft, and the sale
of counterfeit goods, present persistent threats to e-commerce transactions [10].Detecting and
preventing fraud require a combination of sophisticated fraud detection algorithms, machine
learning models, and behavioral analytics. Implementing stringent customer verification
processes, such as identity verification checks and address verification systems (AVS), helps
authenticate the validity of transactions and mitigate fraud risks. Secure payment gateways
equipped with tokenization and end-to-end encryption capabilities protect payment
information during transactions, minimizing the risk of payment fraud and unauthorized access
to financial data.
SYSTEM ANALYSIS
One of the innovative features of the proposed system is the integration of a Telegram
bot. This bot serves as an intuitive and user-friendly interface for network monitoring and
security management. Users can interact with the bot to check network status, review alerts
and notifications, and even perform basic security tasks such as initiating scans or blocking
suspicious activities.
The Telegram bot's real-time alerts and notifications play a crucial role in keeping users
informed about ongoing network security events. Users receive immediate alerts upon
detecting any suspicious activity, enabling them to take immediate action and escalate security
measures if necessary[7]. This proactive approach not only enhances the organization's ability
to respond to threats but also empowers users with greater visibility and control over network
security.
SOFTWARE SPECIFCATION
Mouse : Logitech.
Ram : 4GB
O/S : Windows 7.
Language : Python
Software : Telegram
Chapter – 5
SOFTWARE DESCRIPTION
5.1 PYTHON:
Python is one of the few languages that can be described as both easy to learn and
extremely powerful. You'll be pleasantly pleased at how easy it is to focus on the solution to
the problem rather than the syntax and structure of the programming language. The official
introduction to Python is that it is a simple yet powerful programming language. It employs
efficient high-level data structures and a straightforward but effective approach to object-
oriented programming[11]. Python's elegant syntax and dynamic typing, together with its
interpreted nature, make it a great language for scripting and quick application development in
a variety of fields across most platforms. In the following part, I will go into greater depth about
the majority of these features.
This Python code defines the Software class, which represents a piece of software. Its
features are name, version, description, author, and language. The display_info method prints
out the software's details.
You can use the Software class to represent various software items and provide precise
details for each one. The example at the end shows how to make an instance of the Software
class and display its properties.
Feel free to change the attributes and methods of the Software class to meet your
individual needs. This is simply a basic example of how to describe software in Python.
Python is a simple, minimalist language. Reading a decent Python program feels similar to
reading English, albeit extremely rigorous English! Python's pseudo-code nature is one of its
most notable strengths. It allows you to focus on the solution rather than the language.
As you'll see, Python is really simple to learn. Python has an extremely basic syntax, as
previously stated. Python is a higher-level programming language. Python is much easier to
learn than other languages such as C, C#, Javascript, and Java. Python is a simple programming
language that anyone can learn in a matter of hours or days. It is also a developer-friendly
language.
5.2.3 Free and Open Source
One type of FLOSS (Free/Libré and OpenSource Software) is Python. To put it simply, you are
allowed to examine the source code, distribute copies of this software freely, alter it, and
incorporate parts of it into other free applications. FLOSS is predicated on the idea of a
knowledge-sharing community.One of the reasons Python is so great is that a community
dedicated to creating a better Python has established and is continuously improving the
language.
You never have to worry about low-level matters like controlling the memory your program
uses when writing programs in Python. One high-level language is Python. Writing
applications with Python eliminates the need to memorize memory management and system
design.
5.2.5Easy to debug
Great information for identifying errors. Once you learn to analyze Python's error traces, you
will be able to rapidly find and fix most of the problems with your application. You can tell
what the code is intended to do just by looking at it.
Another portable language is Python. For instance, we don't need to modify Python code
written for Windows in order to run it on Linux, Unix, Mac, or any other platform.
5.3 PORTABLE:
Python has been converted to (or modified to operate on) numerous platforms because
it is an open-source software. If you take care to avoid using any features that are specific to
any one of these platforms, all of your Python applications should run on them without the
need for any modifications at all.
Python is supported on the following operating systems: # -- coding: utf-8 -- OS, Palm
OS, QNX, VMS, Psion, Acorn RISC OS, VxWorks, PlayStation, Sharp Zaurus, Windows CE,
and PocketPC!
It is also possible to utilize platforms such as Kivy to make games for Android, iPhone,
iPad, and PC.
5.3.1 Interpreted
A compiler with different flags and parameters is used to translate a program written in a
compiled language, such as C or C++, into binary code, or 0s and 1s, that your machine can
understand. The linker/loader software copies the program from the hard drive to memory and
launches it when you run it. Python, on the other hand, can be binary without compilation. The
software can be executed straight from the source code.
Internally, Python translates the original code into byte codes, an intermediate form, which it
then translates into your computer's native language to run. Because you don't have to worry
about building the program or making sure the right libraries are loaded and linked, using
Python is really lot easier as a result of all of this[12].
Because you can simply copy your Python program to an other machine and run it there, this
also greatly increases the portability of your Python programs. Because Python code is run one
line at a time, it is an interpreted language. Python does not require compilation, unlike other
languages like C, C++, Java, etc., which facilitates debugging of our programs. Python source
code is instantaneously transformed into bytecode.
5.3.3 Extensible
You can write a portion of your program in C or C++ and use it from your Python program if
you need a crucial piece of code to execute quickly or if you want an algorithm to never be
open. If a programming language can be extended to support more languages, it is said to be
extensible. Python is a very extensible language since it can be used to write code in other
languages, such as C++.
5.3.4 Embeddable
You can allow users of your C/C++ programs to script by embedding Python within the
software. Because Python is an embeddable language, it can be used to write programs that
are able to be included into other programs. This may be used for many different things, such
building unique scripting languages for apps or integrating Python code into web apps[13].
The size of the Python Standard Library is enormous. Regular expressions, unit testing,
documentation generation, threading, databases, web browsers, CGI, FTP, email, XML, XML-
RPC, HTML, WAV files, cryptography, GUI (graphical user interfaces), and other system-
dependent tasks are just a few of the tasks it may assist you with. Recall that all of this is
accessible from any location where Python is installed. This is known as Python's "Batteries
Included" philosophy.The Python Package Index has a number of other excellent libraries in
addition to the standard library.
Python can be used to create sophisticated scientific and numerical applications as well as
desktop and web applications. You may quickly and easily construct custom big data solutions
with Python's data analysis features. To display data in a more enticing manner, you may also
make advantage of the Python data visualization packages and APIs. Python is used by many
sophisticated software developers to complete complex artificial intelligence and natural
language processing jobs.
Python has a number of sophisticated programming tools, like list comprehensions, which build
new lists from other iterables, and generators, which generate iterators using a different method
than most other languages. Additionally, Python has automatic memory management, which
does away with the necessity for explicit memory allocation and release within code.
Python comes with a large standard library that everyone can utilize. In contrast to other
programming languages, this implies that programmers don't have to write code for everything.
Numerous capabilities such as image processing, databases, unit testing, expressions, and many
more are supported via libraries. A growing collection of thousands more components is
accessible in the Python Package Index, in addition to the standard library.
The method most commonly used to assess the effectiveness of a proposed system is
economic analysis. Also referred to as cost-benefit analysis. The predicted savings and
benefits of the suggested system are ascertained through this process. For system
development, the hardware in the system department is enough.
This analysis focuses on the department of the system's hardware and software and how well
it can support the proposed system. Since the department has the necessary hardware and
software, there is little chance that the cost of putting the proposed system into place will
increase. The suggested system meets the requirements, can be developed using the current
facilities, and is technically possible.
People need a lot of training because they are naturally reluctant to change, and this would cost
the company a lot of money. Instead of receiving a report with little detail, the suggested system
can provide reports with daily information instantly upon request from the user.
Chapter – 6
METHODOLOGY
Understand the problem statement, which involves detecting potential attacks in network traffic
data.
Data Acquisition: Obtain a dataset containing network traffic data, including features such as
packet counts, flow duration, protocols, and attack labels.
Handle missing values: Check for missing values in the dataset and impute or remove them
accordingly.
Encode categorical variables: Convert categorical variables into numerical format using
techniques like one-hot encoding.
Feature scaling: Scale the features to a similar range to ensure that all features contribute
equally to the analysis.
Understand the distribution of features and their relationships with the target variable (attack
labels).
Visualize the data using histograms, scatter plots, box plots, etc., to gain insights into the
dataset.
Feature Selection or Engineering: Select relevant features or engineer new features that are
most informative for the task of attack detection.
Choose appropriate machine learning models for anomaly detection, such as Isolation Forest,
One-Class SVM, or Autoencoders.
Evaluate the performance of the trained models using appropriate metrics such as precision,
recall, F1-score, or ROC-AUC.
• Apply the trained model to detect anomalies in the network traffic data.
• Identify instances flagged as anomalies, which may indicate potential attacks.
Rectification:
• Implement actions to rectify detected attacks based on the specific nature of the attacks.
• This may include blocking IP addresses, updating firewall rules, strengthening network
security measures, etc.
Telebot Integration:
Deployment:
• Deploy the finalized model and the Telegram bot for real-time monitoring of network
traffic.
• Ensure scalability, reliability, and security of the deployed system.
• Continuously monitor the performance of the deployed system and update it as needed.
• Handle new attack patterns and adapt the detection and rectification mechanisms
accordingly.
• Regularly review and update the model and the bot to keep up with evolving threats
and changes in the network environment.
Chapter – 7
SYSTEM IMPLEMENTATION
7.1 IMPLEMENTATION :
Data Collection: Gather network traffic data from various sources, such as network sensors,
packet captures, or log files. Ensure that the data includes relevant attributes for analysis, such
as source and destination IP addresses, packet counts, duration of flows, etc.
Data Preprocessing: Clean and preprocess the raw data to handle missing values, normalize
features, and remove noise. Convert categorical variables into numerical representations if
necessary. Split the dataset into training and testing sets.
Response Mechanism: Define actions to be taken upon detecting a potential attack. This could
include blocking suspicious IP addresses, updating firewall rules, logging events for further
analysis, or sending alerts to security personnel
User Interface: Create a user interface for interacting with the system, such as a Telegram bot.
This interface allows users to query the system for potential attacks, receive notifications of
detected anomalies, and take action if necessary.
Testing and Evaluation: Evaluate the performance of the system using test datasets or
simulated attack scenarios. Measure metrics such as detection rate, false positive rate, and
response time to assess the effectiveness of the system in detecting and mitigating attacks.
By following these implementation steps, the proposed system can effectively detect and
respond to network attacks, bolstering the overall security of the network infrastructure.
Chapter – 8
APPENDIX
8.1 OUTPUT:
This graph displays the count of packets over time, with the y-axis representing the
packet count and the x-axis showing forward (outgoing) and backward (incoming) packets. It
helps visualize the activity level of a system in terms of outgoing and incoming data, aiding in
network monitoring and troubleshooting.
8.1.2 HEAD SIZE
The graph displays the size of headers over time, with the y-axis representing header
size and the x-axis showing forward (outgoing) and backward (incoming) packets. It helps
visualize changes in header size for outgoing and incoming data, aiding in network
performance analysis and optimization.
8.1.3 FLAG COUNT
The graph illustrates the count of flags over time, with the y-axis representing flag count
and the x-axis depicting forward (outgoing) and backward (incoming) packets. It provides
insights into the frequency of specific flags in outgoing and incoming data packets, aiding in
network protocol analysis and security monitoring.
8.1.4max,min,avg count
The graph showcases the maximum, minimum, and average packet counts over time,
with the y-axis representing the count values and the x-axis depicting forward (outgoing) and
backward (incoming) packets. It helps visualize the variability and trends in packet counts,
aiding in performance monitoring and anomaly detection in network traffic.
8.1.5 SUBFLOW PACKET
The graph represents the count of subflow packets over time, with the y-axis denoting
the subflow packet count and the x-axis showing forward (outgoing) and backward (incoming)
packets. It provides insights into the distribution and behavior of subflow packets within the
network, aiding in the analysis of network traffic patterns and protocol efficiency.
8.1.6 BULK FLOW
The graph shows the count of bulk flow packets over time, with the y-axis indicating
the bulk flow packet count and the x-axis displaying forward (outgoing) and backward
(incoming) packets. This visualization helps understand the volume and behavior of bulk flow
packets within the network, aiding in traffic management and optimization strategies.
8.1.7 ACTIVE POCKET
The graph represents the count of active packets over time, with the y-axis denoting the
active packet count and the x-axis showing forward (outgoing) and backward (incoming)
packets. It provides insights into the dynamics and frequency of active packets within the
network, aiding in real-time traffic analysis and network performance optimization.
8.1.8 ACTIVE AND IDEL
The graph displays the count of active and idle packets over time, with the y-axis
representing the packet count and the x-axis depicting forward (outgoing) and backward
(incoming) packets. It helps visualize the distribution and behavior of active and idle packets
within the network, aiding in traffic analysis and resource utilization optimization.
8.1.9 WINDOW SIZE
The graph illustrates the window size of packets over time, with the y-axis representing
the window size and the x-axis showing forward (outgoing) and backward (incoming) packets.
It provides insights into how the window size varies for outgoing and incoming data, aiding in
TCP performance analysis and congestion control strategies.
8.1.10 correlation matrix
The correlation matrix displays the relationships between variables, with each cell
showing the correlation coefficient between two variables. Rows and columns represent
different variables, and high positive values (close to 1) indicate strong positive correlations,
while high negative values (close to -1) indicate strong negative correlations. Values near 0
suggest weak or no correlation. This matrix aids in identifying patterns, dependencies, and
relationships among variables, facilitating data analysis and decision-making processes.
8.2 SCREENSHOT:
As shown in the screenshot, which confirms the specified IP as safe. It likely employs various
detection methods, including traffic analysis and threat intelligence, to assess the attack status
accurately. This information helps users make informed decisions about network security and
risk management.
Chapter – 9
The results of the proposed system demonstrate its effectiveness in detecting and
responding to potential network attacks. By analyzing network traffic data in real-time, the
system can accurately identify anomalies indicative of malicious activity, such as unusually
high packet counts or suspicious connection patterns. Upon detection, the system promptly
takes action to mitigate the threat, such as blocking the source IP address or updating firewall
rules to prevent further access.
The discussion surrounding the results emphasizes the importance of proactive network
security measures in today's digital landscape. Traditional methods of reactive security, such
as manual monitoring and incident response, are often inadequate in detecting and mitigating
rapidly evolving threats. In contrast, automated anomaly detection systems enable
organizations to stay ahead of attackers by identifying suspicious behavior in real-time and
taking immediate action to prevent potential breaches.
Overall, the results and discussion underscore the effectiveness and practicality of the
proposed system in bolstering network security defenses and mitigating the risks associated
with cyber attacks.
Chapter - 10
10.1 CONCLUSION:
In the realm of digital connectivity, where every packet holds a story, Python serves as
our steadfast companion—a tool of empowerment and enlightenment. With libraries like scapy
at our disposal, we have transcended the boundaries of observation, delving deep into the heart
of network communication.
Yet, our journey does not end with mere observation. Python empowers us to glean
actionable insights from the data we encounter—whether it's detecting anomalies, optimizing
performance,or fortifying security measures. It is through this fusion of observation and action
that we navigate the ever-changing landscape of digital connectivity.
As we bid adieu to our exploration, let us carry forth the lessons learned—the power of
Python to illuminate the dark corners of network traffic, the importance of informed decision-
making in a world governed by connectivity, and the endless possibilities that lie ahead in our
quest for understanding.Armed with Python and fueled by curiosity, let us continue to unravel
the mysteries of network dynamics, forging new paths and uncovering new insights on our
journey into the digital frontier.
• Industry-specific application
• Calculating latency, packet loss, throughput, jitter, network utilization, and error rates
Chapter – 11
REFERENCE
11.1 REFERENCE:
1. Acquisti A, Grossklags J: Privacy and rationality in individual decision making. IEEE Security &
Privacy 2005, 3:26-33.
2. Corral L, Fronza I, Mikkonen T: User Interface Matters: Analysing the Complexity of Mobile
Applications from a Visual Perspective. Procedia Computer Science 2021, 191:9-16.
3. Dutta P, Suryawanshi P, Gujarathi P, Dutta A: Managing risk for e-commerce supply chains: an
empirical study. IFAC-PapersOnLine 2019, 52:349-354.
4. Jamra RK, Anggorojati B, Kautsarina, Sensuse DI, Suryono RR: Systematic Review of Issues and
Solutions for Security in E-commerce. In 2020 International Conference on Electrical
Engineering and Informatics (ICELTICs); 27-28 Oct. 2020. 2020: 1-5.
5. German Ruiz-Herrera L, Valencia-Arias A, Gallegos A, Benjumea-Arias M, Flores-Siapo E:
Technology acceptance factors of e-commerce among young people: An integration of the
technology acceptance model and theory of planned behavior. Heliyon 2023, 9:e16418.
6. Molinaro KA, Bolton ML: Evaluating the applicability of the double system lens model to the
analysis of phishing email judgments. Computers & Security 2018, 77:128-137.
7. Lei W: Study on Security Countermeasures of Cross-border E-Commerce Payment Risk.
Journal of Physics: Conference Series 2020, 1616:012042.
8. Strandberg PE, Söderman D, Dehlaghi-Ghadim A, Leon M, Markovic T, Punnekkat S,
Moghadam MH, Buffoni D: The Westermo network traffic data set. Data in Brief 2023,
50:109512.
9. Gangakhedkar GR, Fernandes TM: Subjective method for tracheal tube cuff inflation: time to
bid adieu. Brazilian Journal of Anesthesiology (English Edition) 2021, 71:94-95.
10. Kong S, Ai J, Lu M, Gong Y: GRAND: GAN-based software runtime anomaly detection method
using trace information. Neural Networks 2024, 169:365-377.
11. López C, Salmeron JL: Monitoring Software Maintenance Project Risks. Procedia Technology
2012, 5:363-368.
12. Wichmann A, Okkalioglu BD, Korkmaz T: The integration of mobile (tele) robotics and wireless
sensor networks: A survey. Computer Communications 2014, 51:21-35.
13. Wichmann A, Okkalioglu BD, Korkmaz T: The integration of mobile (tele) robotics and wireless
sensor networks: A survey. Computer Communications 2014, 51:21-35.
14. López C, Salmeron JL: Monitoring Software Maintenance Project Risks. Procedia Technology
2012, 5:363-368.
15. Önden A, Kara K, Önden İ, Yalçın GC, Simic V, Pamucar D: Exploring the adoption of the
metaverse and chat generative pre-trained transformer: A single-valued neutrosophic
Dombi Bonferroni-based method for the selection of software development strategies.
Engineering Applications of Artificial Intelligence 2024, 133:108378.
16. Gangakhedkar GR, Fernandes TM: Subjective method for tracheal tube cuff inflation: time to
bid adieu. Brazilian Journal of Anesthesiology (English Edition) 2021, 71:94-95.
17. Kang TW, Mo Y: A comprehensive digital twin framework for building environment
monitoring with emphasis on real-time data connectivity and predictability. Developments
in the Built Environment 2024, 17:100309.