Intrusion detection and prevention in fog based IoT environments: A systematic literature review
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …
resources. An important ally of the IoT is fog computing. It extends cloud computing and …
[HTML][HTML] A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks
GAL Mukhaini, M Anbar, S Manickam… - Journal of King Saud …, 2024 - Elsevier
Abstract The Internet of Things (IoT) connects daily use devices to the Internet, such as
home appliances, health care equipment, sensors, and industrial devices. Concurrently …
home appliances, health care equipment, sensors, and industrial devices. Concurrently …
A machine learning classifier for predicting stable MCI patients using gene biomarkers
Alzheimer's disease (AD) is a neurodegenerative disorder with an insidious onset and
irreversible condition. Patients with mild cognitive impairment (MCI) are at high risk of …
irreversible condition. Patients with mild cognitive impairment (MCI) are at high risk of …
Detection and classification of novel attacks and anomaly in IoT network using rule based deep learning model
Attackers are now using sophisticated techniques, like polymorphism, to change the attack
pattern for each new attack. Thus, the detection of novel attacks has become the biggest …
pattern for each new attack. Thus, the detection of novel attacks has become the biggest …
Machine Learning‐Based Data Analytics for IoT‐Enabled Industry Automation
The virtual network which is regarded as a bridge between real‐world applications and
computerized systems is termed Internet of Things (IoT). Internet of Things can access the …
computerized systems is termed Internet of Things (IoT). Internet of Things can access the …
Energy efficient and secure information dissemination in heterogeneous wireless sensor networks using machine learning techniques
The extensive use of sensor technology in every sphere of life, along with the continuous
digitization of society, makes it realistic to anticipate that the planet will soon be patched with …
digitization of society, makes it realistic to anticipate that the planet will soon be patched with …
COOD: Combined out-of-distribution detection using multiple measures for anomaly & novel class detection in large-scale hierarchical classification
LE Hogeweg, R Gangireddy… - Proceedings of the …, 2024 - openaccess.thecvf.com
High-performing out-of-distribution (OOD) detection both anomaly and novel class is an
important prerequisite for the practical use of classification models. In this paper we focus on …
important prerequisite for the practical use of classification models. In this paper we focus on …
Machine learning human behavior detection mechanism based on python architecture
Human behavior is stimulated by the outside world, and the emotional response caused by it
is a subjective response expressed by the body. Humans generally behave in common …
is a subjective response expressed by the body. Humans generally behave in common …
Feature Selection using Chi Square to Improve Attack Detection Classification in IoT Network: Work in Progress
To maintain network security, Intrusion Detection System (IDS) is needed to detect anomaly
and attack. Designing proper IDS requires accurate model. This paper proposes a model …
and attack. Designing proper IDS requires accurate model. This paper proposes a model …
Hybrid Fuzzy Rule Algorithm and Trust Planning Mechanism for Robust Trust Management in IoT-Embedded Systems Integration
The Internet of Things (IoT) is rapidly expanding and becoming an integral part of daily life,
increasing the potential for security threats such as malware or cyberattacks. Many …
increasing the potential for security threats such as malware or cyberattacks. Many …