An ensemble hyper-tuned model for IoT sensors attacks and anomaly detection
暂无分享,去创建一个
[1] Jaime Lloret,et al. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT , 2017, Sensors.
[2] Angelos Stavrou,et al. Malicious PDF detection using metadata and structural features , 2012, ACSAC '12.
[3] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[4] M. M. A. Hashem,et al. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.
[5] Michal Choras,et al. A scalable distributed machine learning approach for attack detection in edge computing environments , 2018, J. Parallel Distributed Comput..
[6] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[7] Yun-Peng Zhang,et al. Design of a wearable human-computer interaction system based on bioelectrical signal recognition technology , 2018 .
[8] Khaleel Ahmad,et al. AES and MQTT based security system in the internet of things , 2019 .
[9] Yuval Elovici,et al. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.
[10] Junia Valente,et al. Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices , 2019, IEEE Security & Privacy.
[11] Nasir Ghani,et al. A Machine Learning Model for Classifying Unsolicited IoT Devices by Observing Network Telescopes , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[12] Anastasios A. Economides,et al. EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs , 2016, 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC).
[13] Gurusamy Mohan,et al. Dynamic attack detection and mitigation in IoT using SDN , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).
[14] Vinita Malik,et al. Security risk management in IoT environment , 2019, Journal of Discrete Mathematical Sciences and Cryptography.
[15] Elena Sitnikova,et al. Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques , 2017, MONAMI.
[16] Erol Gelenbe,et al. Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments , 2018, FNC/MobiSPC.
[17] Hannu Tenhunen,et al. An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach , 2016 .
[18] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[19] Ying Wang,et al. Intelligent community medical service based on internet of things , 2018, Journal of Interdisciplinary Mathematics.
[20] J. Manyika,et al. Disruptive technologies: Advances that will transform life, business, and the global economy , 2013 .
[21] Kun Yang,et al. A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework , 2018, IEEE Access.
[22] Shusen Yang,et al. A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.
[23] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[24] Young-Sik Jeong,et al. DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.
[25] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[26] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM 2001.
[27] Gayatri Sakya,et al. WSN and IoT based smart city model using the MQTT protocol , 2019 .
[28] Iftikhar Ahmad,et al. Application of artificial neural network in detection of probing attacks , 2009, 2009 IEEE Symposium on Industrial Electronics & Applications.
[29] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[30] Michele Nogueira Lima,et al. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[31] Ramesh Karri,et al. Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[32] Pavan Pongle,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[33] Muttukrishnan Rajarajan,et al. Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks , 2019, Secur. Commun. Networks.