An Efficient Spam Detection Technique for IoT Devices Using Machine Learning
暂无分享,去创建一个
Neeraj Kumar | M. Shamim Hossain | Sahil Garg | Ahmed Ghoneim | Mubarak Alrashoud | Aaisha Makkar | S. Garg | M. S. Hossain | Ahmed Ghoneim | Aaisha Makkar | Mubarak Alrashoud | Neeraj Kumar
[1] Firth Steven,et al. REFIT Smart Home dataset , 2017 .
[2] Ganesh K. Venayagamoorthy,et al. Neural network based secure media access control protocol for wireless sensor networks , 2009, 2009 International Joint Conference on Neural Networks.
[3] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[4] Mohsen Guizani,et al. Blockchain and IoT-Based Cognitive Edge Framework for Sharing Economy Services in a Smart City , 2019, IEEE Access.
[5] Ali Feizollah,et al. Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.
[6] Ali Hassan Sodhro,et al. Artificial Intelligence based QoS optimization for multimedia communication in IoV systems , 2019, Future Gener. Comput. Syst..
[7] Won Kim,et al. The dark side of the Internet: Attacks, costs and responses , 2011, Inf. Syst..
[8] Ran Wolff,et al. Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .
[9] Robert Green,et al. Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network , 2015, SpringSim.
[10] Huan Liu,et al. Feature Selection for High-Dimensional Data: A Fast Correlation-Based Filter Solution , 2003, ICML.
[11] Ali Hassan Sodhro,et al. Artificial Intelligence-Driven Mechanism for Edge Computing-Based Industrial Applications , 2019, IEEE Transactions on Industrial Informatics.
[12] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[13] Avinash Devare,et al. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2016 .
[14] Heekuck Oh,et al. Conditional privacy preserving security protocol for NFC applications , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).
[15] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[16] Hwee Pink Tan,et al. Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.
[17] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[18] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[19] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[20] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.