2018
DOI: 10.1016/j.cose.2018.05.014
|View full text |Cite
|
Sign up to set email alerts
|

A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…The authors leverage sequence-based supervised learning which is based on Influential Relative Grade (IRG) and Relative Mass Function (RMF) which efficiently detects the outliers. Viegas et al [97] aim at energy-efficient and hardware-friendly implementation of the intrusion detection systems in IoT. The authors leveraged 3 classifiers, Decision Tree (DT), Naive Bayes (NB), and Linear Discriminant Analysis (LDA) during their experimentation for intrusion detection.…”
Section: Anomaly/intrusion Detectionmentioning
confidence: 99%
“…The authors leverage sequence-based supervised learning which is based on Influential Relative Grade (IRG) and Relative Mass Function (RMF) which efficiently detects the outliers. Viegas et al [97] aim at energy-efficient and hardware-friendly implementation of the intrusion detection systems in IoT. The authors leveraged 3 classifiers, Decision Tree (DT), Naive Bayes (NB), and Linear Discriminant Analysis (LDA) during their experimentation for intrusion detection.…”
Section: Anomaly/intrusion Detectionmentioning
confidence: 99%
“…IDS consist of four major components namely, Information Source, Feature Selection, Detection Engine and Response. These four components function collaboratively with an objective to identify attacks and report output in a required format [24] . Fig.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…The specificity of their work is to use stateful features and they get up to 30% better performance compared to without these features. Hussain et al [5] list for each problem many surveys that use machine learning techniques ( [9], [10] Butun et al [3] classify the IDS methodology of IDS in 3 categories: 1 -Anomaly Based detection:…”
Section: Related Workmentioning
confidence: 99%