Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques
暂无分享,去创建一个
Joarder Kamruzzaman | Mohammad Mehedi Hassan | Md Mamunur Rashid | Tasadduq Imam | Steven Gordon | J. Kamruzzaman | M. Hassan | Tasadduq Imam | M. Rashid | Steven Gordon | M. Rashid
[1] Yogesh Kumar Dwivedi,et al. Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework , 2020, Information systems frontiers : a journal of research and innovation.
[2] David H. Wolpert,et al. Stacked generalization , 1992, Neural Networks.
[3] Laurence T. Yang,et al. Defending ON–OFF Attacks Using Light Probing Messages in Smart Sensors for Industrial Communication Systems , 2018, IEEE Transactions on Industrial Informatics.
[4] Andreas Spanias,et al. A brief survey of machine learning methods and their sensor and IoT applications , 2017, 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA).
[5] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[6] Ali Alqazzaz,et al. AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning , 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).
[7] Tommaso Melodia,et al. Securing the Internet of Things: New Perspectives and Research Challenges , 2018, ArXiv.
[8] Marc-Oliver Pahl,et al. All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly Detection , 2018, 2018 14th International Conference on Network and Service Management (CNSM).
[9] David A. Landgrebe,et al. A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..
[10] M. A. Jabbar,et al. Cluster Based Ensemble Classification for Intrusion Detection System , 2017, ICMLC.
[11] Amit P. Sheth,et al. Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.
[12] M. M. A. Hashem,et al. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.
[13] Georges Kaddoum,et al. Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[14] Azzedine Boukerche,et al. Sensing, communication and security planes: A new challenge for a smart city system design , 2018, Comput. Networks.
[15] Tan Yigitcanlar,et al. The Sustainability of Artificial Intelligence: An Urbanistic Viewpoint from the Lens of Smart and Sustainable Cities , 2020, Sustainability.
[16] Ravindra C. Thool,et al. Intrusion Detection System Using Bagging Ensemble Method of Machine Learning , 2015, 2015 International Conference on Computing Communication Control and Automation.
[17] Youssef B. Mahdy,et al. Behavior-based features model for malware detection , 2016, Journal of Computer Virology and Hacking Techniques.
[18] Sara Paiva,et al. Enabling technologies and sustainable smart cities , 2020, Sustainable Cities and Society.
[19] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[20] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[21] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[22] Philip S. Yu,et al. A Framework for Clustering Evolving Data Streams , 2003, VLDB.
[23] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[24] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[25] Joarder Kamruzzaman,et al. Robust Malware Defense in Industrial IoT Applications Using Machine Learning With Selective Adversarial Samples , 2020, IEEE Transactions on Industry Applications.
[26] Yoav Freund,et al. Experiments with a New Boosting Algorithm , 1996, ICML.
[27] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[28] Joarder Kamruzzaman,et al. The Co-Evolution of Cloud and IoT Applications , 2019, Advances in Wireless Technologies and Telecommunication.
[29] A. K. M. Najmul Islam,et al. Toward a Sustainable Cybersecurity Ecosystem , 2020, Comput..
[30] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[31] Sebastian Raschka,et al. Python Machine Learning , 2015 .
[32] Federico Cugurullo. Exposing smart cities and eco-cities: Frankenstein urbanism and the sustainability challenges of the experimental city , 2017 .
[33] Alan Davy,et al. Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[34] Ernest Foo,et al. Improving performance of intrusion detection system using ensemble methods and feature selection , 2018, ACSW.
[35] Michal Choras,et al. A scalable distributed machine learning approach for attack detection in edge computing environments , 2018, J. Parallel Distributed Comput..
[36] Hongming Zhou,et al. Extreme Learning Machine for Regression and Multiclass Classification , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[37] Rajkumar Buyya,et al. HealthFog: An Ensemble Deep Learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in Integrated IoT and Fog Computing Environments , 2019, Future Gener. Comput. Syst..
[38] Md. Rafiqul Islam,et al. Hybrids of support vector machine wrapper and filter based framework for malware detection , 2016, Future Gener. Comput. Syst..
[39] Marc-Oliver Pahl,et al. Graph-based IoT microservice security , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
[40] M. Yar,et al. Book Review: Cybercrime and Society , 2006 .
[41] Ragib Hasan,et al. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.
[42] Genya Ishigaki,et al. Fog Computing: Towards Minimizing Delay in the Internet of Things , 2017, 2017 IEEE International Conference on Edge Computing (EDGE).
[43] Saharon Rosset,et al. KDD-cup 99: knowledge discovery in a charitable organization's donor database , 2000, SKDD.
[44] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[45] Nour Moustafa,et al. Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic , 2017 .
[46] Oleksandr Makeyev,et al. Neural network with ensembles , 2010, The 2010 International Joint Conference on Neural Networks (IJCNN).
[47] Joarder Kamruzzaman,et al. A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks , 2019, Electronics.
[48] Amit Kumar Dewangan,et al. An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set , 2014 .
[49] Xin-She Yang,et al. A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.
[50] Yaser Jararweh,et al. Trustworthy and sustainable smart city services at the edge , 2020 .
[51] Mousa Al-Akhras,et al. WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks , 2016, J. Sensors.
[52] Faisal Muhammad Shah,et al. An ensemble framework of anomaly detection using hybridized feature selection approach (HFSA) , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).
[53] Federico Cugurullo. Urban Artificial Intelligence: From Automation to Autonomy in the Smart City , 2020, Frontiers in Sustainable Cities.
[54] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[55] K. P. Soman,et al. Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.
[56] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[57] Ali Dehghantanha,et al. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[58] P. Bahr,et al. Sampling: Theory and Applications , 2020, Applied and Numerical Harmonic Analysis.