IoT Area Network Simulator For Network Dataset Generation

[1]  Jan Vykopal,et al.  Improving Host Profiling with Bidirectional Flows , 2009, 2009 International Conference on Computational Science and Engineering.

[2]  Ali A. Ghorbani,et al.  Characterization of Tor Traffic using Time based Features , 2017, ICISSP.

[3]  Brian Trammell,et al.  Bidirectional Flow Export Using IP Flow Information Export (IPFIX) , 2008, RFC.

[4]  Zhitang Chen,et al.  Predicting future traffic using Hidden Markov Models , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).

[5]  C.-C. Jay Kuo,et al.  Internet Traffic Classification for Scalable QOS Provision , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[6]  Zhitang Chen,et al.  Online flow size prediction for improved network routing , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).

[7]  Steven Euijong Whang,et al.  A Survey on Data Collection for Machine Learning: A Big Data - AI Integration Perspective , 2018, IEEE Transactions on Knowledge and Data Engineering.

[8]  Flaviu Cristian,et al.  Understanding fault-tolerant distributed systems , 1991, CACM.

[9]  Nadeem Javaid,et al.  Fault Detection in Wireless Sensor Networks through the Random Forest Classifier , 2019, Sensors.

[10]  C. M. Sperberg-McQueen,et al.  Extensible markup language , 1997 .

[11]  Riaz Ahmed Shaikh,et al.  An analysis of fault detection strategies in wireless sensor networks , 2017, J. Netw. Comput. Appl..

[12]  Hong Liu,et al.  Inter-data-center network traffic prediction with elephant flows , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[13]  Sudarshan Rao Operational Fault Detection in cellular wireless base-stations , 2006, IEEE Transactions on Network and Service Management.

[14]  Benoit Claise,et al.  Cisco Systems NetFlow Services Export Version 9 , 2004, RFC.

[15]  Krzysztof Grochla,et al.  Testing and Scalability Analysis of Network Management Systems Using Device Emulation , 2012, CN.

[16]  Marti A. Hearst Trends & Controversies: Support Vector Machines , 1998, IEEE Intell. Syst..

[17]  Yuto Lim,et al.  Time Delay Modeling for Energy Efficient Thermal Comfort Control System in Smart Home Environment , 2017 .

[18]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[19]  Senén Barro,et al.  Do we need hundreds of classifiers to solve real world classification problems? , 2014, J. Mach. Learn. Res..

[20]  Ali A. Ghorbani,et al.  Characterization of Encrypted and VPN Traffic using Time-related Features , 2016, ICISSP.

[21]  Yuto Lim,et al.  Support for ECHONET-based smart home environments in the universAAL ecosystem , 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE).

[22]  Mo Adda,et al.  Comparative Analysis of Clustering Techniques in Network Traffic Faults Classification , 2017 .

[23]  Min Zhang,et al.  Failure prediction using machine learning and time series in optical network. , 2017, Optics express.

[24]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[25]  Aman Jantan,et al.  State-of-the-art in artificial neural network applications: A survey , 2018, Heliyon.

[26]  Eric Eaton,et al.  Building more accurate decision trees with the additive tree , 2019, Proceedings of the National Academy of Sciences.

[27]  Raouf Boutaba,et al.  A comprehensive survey on machine learning for networking: evolution, applications and research opportunities , 2018, Journal of Internet Services and Applications.

[28]  Arash Habibi Lashkari,et al.  Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls , 2019, 2019 International Carnahan Conference on Security Technology (ICCST).

[29]  Chris D. Nugent,et al.  The creation of simulated activity datasets using a graphical intelligent environment simulation tool , 2014, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[30]  Kevin L. Priddy,et al.  Artificial neural networks - an introduction , 2005, Tutorial text series.

[31]  Arnaud Dupas,et al.  Semantic networking: Flow-based, traffic-aware, and self-managed networking , 2009 .

[32]  Ali A. Ghorbani,et al.  Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy , 2019, 2019 International Carnahan Conference on Security Technology (ICCST).

[33]  Yuto Lim,et al.  An Ontology-driven ECHONET Lite Adaptation Layer for Smart Homes , 2019, J. Inf. Process..

[34]  Antonio Pescapè,et al.  Traffic identification engine: an open platform for traffic classification , 2014, IEEE Network.

[35]  Andrej Udovč,et al.  Extending life cycle assessment normalization factors and use of machine learning – A Slovenian case study , 2015 .

[36]  Keiichi Yasumoto,et al.  UbiREAL: Realistic Smartspace Simulator for Systematic Testing , 2006, UbiComp.

[37]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.