The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.1007/s11277-023-10693-w
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments

S. Sasikala,
Sengathir Janakiraman
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…Similarly, the graph shows the evaluation metrics for all the patients in the dataset. The graph helps to visualize and compare the different evaluation metrics across the different patients [25] [26], thereby giving insights into the performance of the MECC system.…”
Section: Results and Analysismentioning
confidence: 99%
“…Similarly, the graph shows the evaluation metrics for all the patients in the dataset. The graph helps to visualize and compare the different evaluation metrics across the different patients [25] [26], thereby giving insights into the performance of the MECC system.…”
Section: Results and Analysismentioning
confidence: 99%
“…Regular firmware updates are essential to address emerging security vulnerabilities, and automated patch management systems ensure these updates are consistently applied. Furthermore, the encryption of data, both in transit and at rest, coupled with data integrity checks, safeguards sensitive information against interception and tampering [12]. However, technical solutions alone are not sufficient.…”
Section: Prevention and Mitiga-tion Strategiesmentioning
confidence: 99%