<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://barikisuasulba.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://barikisuasulba.com/journal_article/bringing-iot-intrusion-detection-to-the-edge/</loc><lastmod>2026-01-22T10:12:07+00:00</lastmod></url><url><loc>https://barikisuasulba.com/journal_article/flow-based-vs-packet-level-intrusion-detection-for-iot-networks-a-comparative-resource-and-performance-analysis/</loc><lastmod>2026-01-22T12:46:46+00:00</lastmod></url><url><loc>https://barikisuasulba.com/journal_article/comparing-performance-of-machine-learning-tools-across-computing-platforms/</loc><lastmod>2026-01-22T12:51:18+00:00</lastmod></url><url><loc>https://barikisuasulba.com/journal_article/impact-of-training-set-size-on-resource-usage-of-machine-learning-models-for-iot-network-intrusion-detection/</loc><lastmod>2026-01-22T13:16:03+00:00</lastmod></url><url><loc>https://barikisuasulba.com/journal_article/implementing-and-deploying-an-ml-pipeline-for-iot-intrusion-detection-with-node-red/</loc><lastmod>2026-01-22T13:23:22+00:00</lastmod></url><url><loc>https://barikisuasulba.com/journal_article/group-mutual-exclusion-in-opportunistic-network/</loc><lastmod>2026-01-22T13:29:34+00:00</lastmod></url></urlset>
