Skip to main content
. 2023 Aug 28;23(17):7470. doi: 10.3390/s23177470
ABC Artificial Bee Colony
ACL Access Control List
AES Advanced Encryption Standard
AI Artificial Intelligence
AMI Advanced Metering Infrastructure
ANN Artificial Neural Network
AP Access Point
API Application Programming Interface
AT&T American Telephone and Telegraph
AUC Area Under the Curve
B-LSTM Bidirectional Long Short-Term Memory
CC Cloud Computing
CFBPNN Cascade Forward Back-Propagation Neural Network
CFS Correlation-based Feature Selection
CIA Confidentiality, Integrity, Availability
CPS Cyber-Physical System
CSP Cloud Service Provider
CSRF Cross-Site Request Forgery
DDoS Distributed Denial of Service
DL Deep Learning
DNN Deep Neural Network
DNS Domain Name System
DoS Denial of Service
DSI Device-Side Injection
DSSS Direct Sequence Spread Spectrum
DTW Dynamic Time Warping
FDL Federated Deep Learning
FHSS Frequency Hopping Spread Spectrum
GDE Global Detection Enactor
GE General Electric
GM Geometric Mean
GnuPG GNU Privacy Guard
GRU Gated Recurrent Unit
HAN Home Area Network
HTTP HyperText Transfer Protocol
IBM International Business Machines
ICS Industrial Control System
ICV Intelligent Connected Vehicles
IDS Intrusion Detection System
IIC Industrial Internet Consortium
IIoT Industrial Internet of Things
IIRA Industrial Internet Reference Architecture
I/O Input/Output
IoT Internet of Things
IoV Internet of Vehicles
IP Internet Protocol
IPFS Interplanetary File System
IPS Intrusion Prevention System
kNN k-Nearest Neighbors
LAE Long short-term memory Autoencoder
LR Logistic Regression
LSTM Long Short-Term Memory
MC Markov Chain
MCC Mobile Cloud Computing
ML Machine Learning
MLP Multi-Layer Perceptron
NARX Nonlinear Autoregressive network with eXogenous input
NFC Near-field Communication
OLE Object Linking and Embedding
OTA Over-The-Air
PEC Pervasive Edge Computing
PKI Public Key Infrastructure
PLC Program Logic Controller
PoV Proof of Vote
PSO Particle Swarm Optimization
PUF Physically Unclonable Functions
RCE Remote Code Execution
RFID Radio Frequency Identification
RNN Recurrent Neural Network
RPL Routing Protocol for Low-power and lossy networks
RPT Requesting Party Token
RSA Rivest, Shamir, and Adleman
RTT Round Trip Time
SCADA Supervisory Control And Data Acquisition
SDN Software-Defined Networking
SQL Structured Query Language
SQLI Structured Query Language Injection
SPOF Single Point Of Failure
SMB Server Message Block
SSI Server-Side Injection
SSRF Server-Side Request Forgery
SVM Support Vector Machine
TEE Trusted Execution Environment
TPM Trusted Platform Module
TTP Trusted Third Party
UMA User-Managed Access
VCC Vehicular Cloud Computing
VNF Virtual Network Function
WAF Web Application Firewall
Wi-Fi Wireless Fidelity
WSN Wireless Sensor Network
XGBoost eXtreme Gradient Boosting
XML eXtensible Markup Language
XSS Cross-Site Scripting