Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0
暂无分享,去创建一个
[1] Dragan Perakovic,et al. Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic , 2021, Mobile Networks and Applications.
[2] Brij B. Gupta,et al. IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network , 2021, IEEE Internet of Things Journal.
[3] Neeraj Kumar,et al. An Efficient Spam Detection Technique for IoT Devices Using Machine Learning , 2021, IEEE Transactions on Industrial Informatics.
[4] Neena Gupta,et al. Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller , 2021, Telecommun. Syst..
[5] Dragan Peraković,et al. Ensemble machine learning approach for classification of IoT devices in smart home , 2021, Int. J. Mach. Learn. Cybern..
[6] Shady S. Refaat,et al. Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques , 2020, Inf..
[7] Brij B. Gupta,et al. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..
[8] Nhien-An Le-Khac,et al. Security Considerations for Internet of Things: A Survey , 2020, SN Computer Science.
[9] Dragan Peraković,et al. An Overview of Distributed Denial of Service Traffic Detection Approaches , 2019, PROMET - Traffic&Transportation.
[10] Dragan Peraković,et al. Novel approach for detection of IoT generated DDoS traffic , 2019, Wirel. Networks.
[11] Mohammad A. Alsmirat,et al. Impact of digital fingerprint image quality on the fingerprint recognition accuracy , 2019, Multimedia Tools and Applications.
[12] B. B. Gupta,et al. Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.
[13] Xuan Li,et al. Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.
[14] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[15] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[16] Sanjay Agrawal,et al. A hybrid approach for spam filtering using local concentration based K-Means clustering , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).
[17] Georgios Paliouras,et al. Spam Filtering: an Active Learning Approach using Incremental Clustering , 2014, WIMS '14.
[18] Jemal H. Abawajy,et al. Profiling Phishing Email Based on Clustering Approach , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[19] Harry Wechsler,et al. Phishing detection using traffic behavior, spectral clustering, and random forests , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.
[20] B. B. Gupta,et al. A Survey of Phishing Email Filtering Techniques , 2013, IEEE Communications Surveys & Tutorials.
[21] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[22] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[23] Fergus Toolan,et al. Feature selection for Spam and Phishing detection , 2010, 2010 eCrime Researchers Summit.
[24] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[25] Christian Esposito,et al. Blockchain-based authentication and authorization for smart city applications , 2021, Inf. Process. Manag..
[26] Miroslav Vujić,et al. Classification of Security Risks in the IoT Environment , 2016 .