Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0

[1]  Dragan Perakovic,et al.  Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic , 2021, Mobile Networks and Applications.

[2]  Brij B. Gupta,et al.  IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network , 2021, IEEE Internet of Things Journal.

[3]  Neeraj Kumar,et al.  An Efficient Spam Detection Technique for IoT Devices Using Machine Learning , 2021, IEEE Transactions on Industrial Informatics.

[4]  Neena Gupta,et al.  Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller , 2021, Telecommun. Syst..

[5]  Dragan Peraković,et al.  Ensemble machine learning approach for classification of IoT devices in smart home , 2021, Int. J. Mach. Learn. Cybern..

[6]  Shady S. Refaat,et al.  Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques , 2020, Inf..

[7]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[8]  Nhien-An Le-Khac,et al.  Security Considerations for Internet of Things: A Survey , 2020, SN Computer Science.

[9]  Dragan Peraković,et al.  An Overview of Distributed Denial of Service Traffic Detection Approaches , 2019, PROMET - Traffic&Transportation.

[10]  Dragan Peraković,et al.  Novel approach for detection of IoT generated DDoS traffic , 2019, Wirel. Networks.

[11]  Mohammad A. Alsmirat,et al.  Impact of digital fingerprint image quality on the fingerprint recognition accuracy , 2019, Multimedia Tools and Applications.

[12]  B. B. Gupta,et al.  Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.

[13]  Xuan Li,et al.  Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.

[14]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[15]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[16]  Sanjay Agrawal,et al.  A hybrid approach for spam filtering using local concentration based K-Means clustering , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[17]  Georgios Paliouras,et al.  Spam Filtering: an Active Learning Approach using Incremental Clustering , 2014, WIMS '14.

[18]  Jemal H. Abawajy,et al.  Profiling Phishing Email Based on Clustering Approach , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[19]  Harry Wechsler,et al.  Phishing detection using traffic behavior, spectral clustering, and random forests , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[20]  B. B. Gupta,et al.  A Survey of Phishing Email Filtering Techniques , 2013, IEEE Communications Surveys & Tutorials.

[21]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[22]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[23]  Fergus Toolan,et al.  Feature selection for Spam and Phishing detection , 2010, 2010 eCrime Researchers Summit.

[24]  Norman M. Sadeh,et al.  Learning to detect phishing emails , 2007, WWW '07.

[25]  Christian Esposito,et al.  Blockchain-based authentication and authorization for smart city applications , 2021, Inf. Process. Manag..

[26]  Miroslav Vujić,et al.  Classification of Security Risks in the IoT Environment , 2016 .