2018
DOI: 10.32604/cmc.2018.03754
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…Security is also one of the main researches for mobile services in IoTs. For example, the IoT device security [16], network attacks [17], content security [18], and privacy protection, etc. The privacy protection is the main focus of this paper.…”
Section: Related Workmentioning
confidence: 99%
“…Security is also one of the main researches for mobile services in IoTs. For example, the IoT device security [16], network attacks [17], content security [18], and privacy protection, etc. The privacy protection is the main focus of this paper.…”
Section: Related Workmentioning
confidence: 99%
“…The resistance value of the MQ-3 alcohol sensor differs in the values exhibited by gases of different types and concentrations [Shi (2018); Chen, Liu, Ma et al (2018)]. Therefore, when designing its hardware circuit, the voltage value is changed by changing the resistance value, and the alcohol concentration is calculated by reading the voltage value ;Fan, Zhu, Zhao et al (2017); ].…”
Section: Sensor Module Designmentioning
confidence: 99%
“…The integration and diversification of IoT terminals has brought many security uncertainties to the IoT business, and the problems are mainly reflected in the following points [11][12][13][14][15][16]: *Correspondence: jiangyu@seu.edu.cn 1 School of Cyber Science and Engineering, Southeast University, Sipai Lou, 210096 Nanjing, China Full list of author information is available at the end of the article • Most of the IoT terminals cannot integrate software and hardware for security protection because of the limitation of cost and performance. • Many application scenarios are open and unattended, so this self-running mode is vulnerable to external attacks.…”
Section: Introductionmentioning
confidence: 99%