[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology
BK Mohanta, D Jena, U Satapathy - researchgate.net
… An extensive survey on similar technologies like machine … detection, anomaly detection,
Host-based IDS, and Network-… K-Means Clustering machine learning algorithm to analyze the …
Host-based IDS, and Network-… K-Means Clustering machine learning algorithm to analyze the …
[HTML][HTML] 基於統計與深度學習之單變數時間序列異常檢測
JB Kao - 2019 - ir.lib.ncu.edu.tw
… to the rapid development of the Internet of Things (IoT) technology. As a … This paper proposes
an anomaly detection framework for … Different schemes using statistics and deep learning …
an anomaly detection framework for … Different schemes using statistics and deep learning …
Data Mining for Cyber 𠄁Physical Systems
MV Rao, DA Reddy, A Ampavathi… - … and Machine Learning …, 2022 - Wiley Online Library
… and suggested a non-parametric outlier detection (NPOD) model for … of IoT (exercise intensity
increases-IoT) to solve scientific … is the algorithm function of the person looking through the …
increases-IoT) to solve scientific … is the algorithm function of the person looking through the …
[PDF][PDF] [課題研究報告書] A Survey on Internet of Things for Smart Health Technologies
DT Le - 2018 - dspace02.jaist.ac.jp
… make an extensive review of … machine learning algorithms that are used to model the
activities, and the complexity of the activities that are being modeled [70][71]. For Anomaly Detection…
activities, and the complexity of the activities that are being modeled [70][71]. For Anomaly Detection…
智能电网的网络安全风险及应对策略
岳芳, 王雪珍, 姜山 - 科技导报, 2024 - kjdb.org
… Machine learning algorithms can improve the accuracy and sensitivity of power grid fault
detection and attack identification. … anomaly detection for wide-area protection using machine …
detection and attack identification. … anomaly detection for wide-area protection using machine …
软件定义网络中基于深度神经网络的DDoS 攻击检测
刘振鹏, 王仕磊, 郭超, 陈杰… - 云南大学学报(自然科学版), 2022 - yndxxb.ynu.edu.cn
… traffic characteristics, and detect whether the attack occurs through AdamDNN. … machine
learning and Shannon entropy detection schemes, the detection success rate of this scheme …
learning and Shannon entropy detection schemes, the detection success rate of this scheme …
[PDF][PDF] Cutting tool parameter identification and machined surface quality inspection based on deep learning for advanced machine tool development (本文)
AP Rifai - (No Title), 2019 - core.ac.uk
… this study aims to develop a deep learning-based identification and prediction method for
machining inspection… using edge detection algorithms and the newly developed approximation …
machining inspection… using edge detection algorithms and the newly developed approximation …
工业物联网异常检测技术综述
孙海丽, 龙翔, 韩兰胜, 黄炎, 李清波 - 通信学报, 2022 - infocomm-journal.com
… Internet of things (IIoT), based on technical principles, the network anomaly detection papers
… forensic framework based on deep learning for Internet of things networks: a particle deep …
… forensic framework based on deep learning for Internet of things networks: a particle deep …
使用XGBoost 機器學習法進行攻擊檢測與分析並以ELK Stack 視覺化於網路日誌系統
賴慶翰 - 2019 - thuir.lib.thu.edu.tw
… the technology for cyber-attacks and use Machine Learning … the most useful algorithmic tools
in the Machine Learning field … attacker activities in iot through machine learning techniques. …
in the Machine Learning field … attacker activities in iot through machine learning techniques. …