2020 International Conference on Data Science, Artificial Intelligence, and Business Analytics (DATABIA) 2020
DOI: 10.1109/databia50434.2020.9190436
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on The Accuracy of Machine Learning Techniques for Intrusion and Anomaly Detection on Public Data Sets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…Conventional security systems cannot be directly applied to IoT systems [29]. This is because objects in IoT are dynamic, in the sense that objects (devices) can freely join or separate from the IoT community where these objects join.…”
Section: Security Threats On the Internet Of Thingsmentioning
confidence: 99%
See 1 more Smart Citation
“…Conventional security systems cannot be directly applied to IoT systems [29]. This is because objects in IoT are dynamic, in the sense that objects (devices) can freely join or separate from the IoT community where these objects join.…”
Section: Security Threats On the Internet Of Thingsmentioning
confidence: 99%
“…RFID tags have a unique PIN, such as a 32-bit PIN. If the attacker enters the correct PIN from the RFID reader, the RFID tag can be instructed to deactivate, so that the tag no longer operates after receiving this command [29]. In addition, there is a sleep command that puts the tag to sleep, for example, by making it inactive for a predetermined amount of time [19].…”
Section: Table 2 the Security Solution For Rfidmentioning
confidence: 99%
“…AI is a term used to build artificial human brains that can learn, plan, perceive, and analyze natural language. It is the study and creation of computer systems capable of performing activities that need human intelligence, such as visual perception, speech recognition, decision-making, and language translation [16]. ML and deep learning are the most often utilized AI technologies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Text mining has been defined by many research experts and practitioners. Text mining has the definition of mining data in the form of text [12] where the data source is usually obtained from documents [6], and the goal is to find words that can represent the contents of the document so that analysis of the relationship between documents can be carried out. The text mining system consists of a text preprocessing component, feature selection [13], and a data mining component.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Good clustering should classify or classify objects that have similarities in one group and separate objects that are not similar. Basically, there are two clustering methods [6], but in this final project a hierarchical clustering method will be used. One type of this method is agglomerative clustering, a method that is bottom-up clustering, which is the merging of several objects into a single cluster.…”
Section: Introductionmentioning
confidence: 99%