Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
暂无分享,去创建一个
Xiaojiang Du | Mohsen Guizani | Zhihong Tian | Yanbin Sun | Muhammad Shafiq | M. Guizani | Zhihong Tian | Xiaojiang Du | M. Shafiq | Yanbin Sun
[1] David Aldous,et al. The Continuum Random Tree III , 1991 .
[2] Dawei Wang,et al. Effective Feature Selection for 5G IM Applications Traffic Classification , 2017, Mob. Inf. Syst..
[3] Robert P. Sheridan,et al. Random Forest: A Classification and Regression Tool for Compound Classification and QSAR Modeling , 2003, J. Chem. Inf. Comput. Sci..
[4] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[5] Andrew W. Moore,et al. Bayesian Neural Networks for Internet Traffic Classification , 2007, IEEE Transactions on Neural Networks.
[6] Xia Zhang,et al. The bijective soft set with its operations , 2010, Comput. Math. Appl..
[7] Ke Zhang,et al. Artificial Intelligence Inspired Transmission Scheduling in Cognitive Vehicular Communications and Networks , 2019, IEEE Internet of Things Journal.
[8] Mohsen Guizani,et al. Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles , 2019, IEEE Internet of Things Journal.
[9] David D. Lewis,et al. Naive (Bayes) at Forty: The Independence Assumption in Information Retrieval , 1998, ECML.
[10] Xiaojiang Du,et al. A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.
[11] D. Molodtsov. Soft set theory—First results , 1999 .
[12] Yang Liu,et al. An introduction to decision tree modeling , 2004 .
[13] Xiang Chen,et al. Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.
[14] Ke Zhang,et al. Deep Learning Empowered Task Offloading for Mobile Edge Computing in Urban Informatics , 2019, IEEE Internet of Things Journal.
[15] M. E. Maron,et al. Automatic Indexing: An Experimental Inquiry , 1961, JACM.
[16] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[17] David Heckerman,et al. A Tutorial on Learning with Bayesian Networks , 1999, Innovations in Bayesian Networks.
[18] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[19] Jiankun Hu,et al. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.
[20] Walaa Hamouda,et al. A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.
[21] Di Wu,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[22] Ali Dehghantanha,et al. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[23] Dongwen Zhang,et al. Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City , 2020, IEEE Transactions on Industrial Informatics.
[24] Nabin Kumar Karn,et al. Network Traffic Classification techniques and comparative analysis using Machine Learning algorithms , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[25] Asif Ali Laghari,et al. WeChat Text Messages Service Flow Traffic Classification Using Machine Learning Technique , 2016, 2016 6th International Conference on IT Convergence and Security (ICITCS).
[26] Paulus Insap Santosa,et al. Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation , 2019, AINA.
[27] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[28] Pedro M. Domingos,et al. On the Optimality of the Simple Bayesian Classifier under Zero-One Loss , 1997, Machine Learning.
[29] Nabin Kumar Karn,et al. WeChat Text and Picture Messages Service Flow Traffic Classification Using Machine Learning Technique , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[30] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[31] Guojun Wang,et al. Wi-Fi frequency selection concept for effective coverage in collapsed structures , 2019, Future Gener. Comput. Syst..
[32] Muhammad Shafiq,et al. Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification , 2017, Mob. Inf. Syst..
[33] Xiaojiang Du,et al. An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).
[34] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[35] A. R. Roy,et al. Soft set theory , 2003 .
[36] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[37] Puneet Tandon,et al. A bijective soft set theoretic approach for concept selection in design process , 2017 .
[38] Mohan Li,et al. Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems , 2020, IEEE Internet of Things Journal.
[39] Kim-Kwang Raymond Choo,et al. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.
[40] Andy Liaw,et al. Classification and Regression by randomForest , 2007 .
[41] Ali Kashif Bashir,et al. A machine learning approach for feature selection traffic classification using security analysis , 2018, The Journal of Supercomputing.
[42] Shen Su,et al. Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.
[43] Lianbing Deng,et al. Mobile network intrusion detection for IoT system based on transfer learning algorithm , 2018, Cluster Computing.
[44] Yuval Elovici,et al. Detection of Unauthorized IoT Devices Using Machine Learning Techniques , 2017, ArXiv.
[45] Xiaojiang Du,et al. A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows , 2016, 2016 IEEE International Conference on Communications (ICC).
[46] Xiaohui Liang,et al. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals , 2016, CCS.
[47] Yuval Elovici,et al. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.
[48] A. R. Roy,et al. A fuzzy soft set theoretic approach to decision making problems , 2007 .