Edge Mining on IoT Devices Using Anomaly Detection
暂无分享,去创建一个
[1] Rajeev Kumar Kanth,et al. Distributed internal anomaly detection system for Internet-of-Things , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[2] Yaxin Bi,et al. KNN Model-Based Approach in Classification , 2003, OTM.
[3] Ali Dehghantanha,et al. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[4] Tie Luo,et al. Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT , 2018, 2018 IEEE International Conference on Communications (ICC).
[5] Rakesh Kumar Mishra,et al. Aspects of Network Architecture for Remote Healthcare Systems , 2016, 2016 2nd International Conference on Computational Intelligence and Networks (CINE).
[6] Gilles Louppe,et al. Understanding Random Forests: From Theory to Practice , 2014, 1407.7502.
[7] Zahir Tari,et al. On the Move to Meaningful Internet Systems. OTM 2018 Conferences , 2018, Lecture Notes in Computer Science.
[8] Gareth Halfacree,et al. Raspberry Pi User Guide , 2012 .
[9] Cong Li,et al. Robust Distributed Anomaly Detection Using Optimal Weighted One-Class Random Forests , 2018, 2018 IEEE International Conference on Data Mining (ICDM).
[10] Distributed K-Nearest Neighbors , 2016 .
[11] Burak Kantarci,et al. Anomaly detection and privacy preservation in cloud-centric Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[12] Deris Stiawan,et al. Anomaly detection and monitoring in Internet of Things communication , 2016, 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE).
[13] Ehud D. Karnin,et al. A simple procedure for pruning back-propagation trained neural networks , 1990, IEEE Trans. Neural Networks.
[14] James Brusey,et al. Edge Mining the Internet of Things , 2013, IEEE Sensors Journal.
[15] Marimuthu Palaniswami,et al. Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering , 2017, IEEE Internet of Things Journal.
[16] G. V. Puskorius,et al. Truncated backpropagation through time and Kalman filter training for neurocontrol , 1994, Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94).
[17] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[18] Yuji Sekiya,et al. Unsupervised Scanning Behavior Detection Based on Distribution of Network Traffic Features Using Robust Autoencoders , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).
[19] Abbas Javed,et al. Intelligent Intrusion Detection in Low-Power IoTs , 2016, ACM Trans. Internet Techn..
[20] Behnam Dezfouli,et al. EMPIOT: An Energy Measurement Platform for Wireless IoT Devices , 2018, J. Netw. Comput. Appl..
[21] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[22] S. Imandoust,et al. Application of K-Nearest Neighbor (KNN) Approach for Predicting Economic Events: Theoretical Background , 2013 .
[23] Tarik Taleb,et al. An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.
[24] Stephen M. Omohundro,et al. Five Balltree Construction Algorithms , 2009 .
[25] Stepan Ivanov,et al. Collaborative Edge Mining for predicting heat stress in dairy cattle , 2016, 2016 Wireless Days (WD).
[26] Yu Chen,et al. Ultra-lightweight deep packet anomaly detection for Internet of Things devices , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).
[27] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[28] Marco Mancini,et al. Anomaly Detection Models for IoT Time Series Data , 2018, ArXiv.
[29] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[30] Soma Bandyopadhyay,et al. IoT Healthcare Analytics: The Importance of Anomaly Detection , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[31] Xiangyu Wang,et al. A Direct Approach for Sparse Quadratic Discriminant Analysis , 2015, J. Mach. Learn. Res..
[32] Mohammad Zulkernine,et al. Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.
[33] A. Ganapathiraju,et al. LINEAR DISCRIMINANT ANALYSIS - A BRIEF TUTORIAL , 1995 .
[34] Shadi A. Aljawarneh,et al. GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things , 2018, The Journal of Supercomputing.
[35] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[36] Shen Bin,et al. Research on data mining models for the internet of things , 2010, 2010 International Conference on Image Analysis and Signal Processing.
[37] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[38] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.