Random forest classifier‐based safe and reliable routing for opportunistic IoT networks
暂无分享,去创建一个
Isaac Woungang | Sanjay Kumar Dhurandher | Nisha Kandhoul | S. K. Dhurandher | I. Woungang | Nisha Kandhoul
[1] Martin Kopp,et al. Anomaly explanation with random forests , 2020, Expert Syst. Appl..
[2] Joel J. P. C. Rodrigues,et al. RLProph: a dynamic programming based reinforcement learning approach for optimal routing in opportunistic IoT networks , 2020, Wirel. Networks.
[3] S. M. Dilip Kumar,et al. Machine Learning Based Efficient Multi-copy Routing for OppIoT Networks , 2019 .
[4] Deepak Kumar Sharma,et al. A Machine Learning Approach Using Classifier Cascades for Optimal Routing in Opportunistic Internet of Things Networks , 2019, 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[5] Joel J. P. C. Rodrigues,et al. A Machine Learning-Based Protocol for Efficient Routing in Opportunistic Networks , 2018, IEEE Systems Journal.
[6] Sanjay Sharma,et al. Detection of Advanced Malware by Machine Learning Techniques , 2018, Advances in Intelligent Systems and Computing.
[7] Rahul Gomes,et al. Random Forest Classifier in SDN Framework for User-Based Indoor Localization , 2018, 2018 IEEE International Conference on Electro/Information Technology (EIT).
[8] Santosh Biswas,et al. MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing , 2018, J. Netw. Comput. Appl..
[9] Wei Liu,et al. A principle component analysis-based random forest with the potential nearest neighbor method for automobile insurance fraud identification , 2017, Appl. Soft Comput..
[10] Qi Zhao,et al. Detection of DNS DDoS Attacks with Random Forest Algorithm on Spark , 2018, FNC/MobiSPC.
[11] Mohammad S. Obaidat,et al. Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).
[12] Vicky H. Mak-Hau,et al. Defense against packet collusion attacks in opportunistic networks , 2017, Comput. Secur..
[13] Anthony Skjellum,et al. Using machine learning to secure IoT systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[14] H. Vincent Poor,et al. Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[15] Ali Feizollah,et al. Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.
[16] Andrew W. Appel,et al. Verification of a Cryptographic Primitive: SHA-256 , 2015, TOPL.
[17] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[18] Zhu Wang,et al. Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things , 2013, J. Netw. Comput. Appl..
[19] Mohammed S. Alam,et al. Random Forest Classification for Detecting Android Malware , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[20] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[21] Rob Stocker,et al. Using Decision Tree for Diagnosing Heart Disease Patients , 2011, AusDM.
[22] J. Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SimuTools.
[23] Marco Conti,et al. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.
[24] Leo Breiman,et al. Random Forests , 2001, Machine Learning.