2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA) 2017
DOI: 10.1109/icmla.2017.0-163
|View full text |Cite
|
Sign up to set email alerts
|

A Machine Learning Approach to Detecting Sensor Data Modification Intrusions in WBANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…Additionally, measured data of blood glucose sensor was examined in order to detect adversarial and accidental data modification intrusions ( Verner & Butvinik, 2017 ). Here, Otsu’s thresholding algorithm was used with extra statistical analysis to create different informative feature vectors.…”
Section: Results and Findingsmentioning
confidence: 99%
“…Additionally, measured data of blood glucose sensor was examined in order to detect adversarial and accidental data modification intrusions ( Verner & Butvinik, 2017 ). Here, Otsu’s thresholding algorithm was used with extra statistical analysis to create different informative feature vectors.…”
Section: Results and Findingsmentioning
confidence: 99%
“…The results showed that the decision tree algorithm achieved the highest accuracy with fast training and prediction compared to the other algorithms. The SVM was the algorithm of choice in the study of Verner and Butvinik [20], where data of a blood glucose sensor was inspected in an attempt to detect accidental data modification intrusions. Other researchers [13] implemented an ML model to separate valid from anomalous data using a combination of a neural network (NN) with Ensemble Linear Regression as detection method.…”
Section: Related Work 31 Anomaly Detection In Ehealth Networkmentioning
confidence: 99%
“…It was concluded that the system was able to effectively detect the anomaly. Additionally, measured data of blood glucose sensor was examined in order to detect adversarial and accidental data modification intrusions (Verner & Butvinik 2017). Here, Otsu's thresholding algorithm was used with extra statistical analysis to create different informative feature vectors.…”
Section: Computer Sciencementioning
confidence: 99%