2023
DOI: 10.32604/csse.2023.030188
|View full text |Cite
|
Sign up to set email alerts
|

Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment

Abstract: Recently, Internet of Things (IoT) devices produces massive quantity of data from distinct sources that get transmitted over public networks. Cybersecurity becomes a challenging issue in the IoT environment where the existence of cyber threats needs to be resolved. The development of automated tools for cyber threat detection and classification using machine learning (ML) and artificial intelligence (AI) tools become essential to accomplish security in the IoT environment. It is needed to minimize security iss… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 20 publications
0
4
0
1
Order By: Relevance
“…where ω is the weight matrix, b is the bias term, Ф is the nonlinear transformation from an n-dimensional space to a higher-dimensional feature space, Γ is the cost function, ε is the allowable error, and C is a constant that determines the tradeoff between the minimal training error and minimal model complexity ||ω|| 2 . The vectors outside the ε-tube can be obtained by using the slack variables ξ i .…”
Section: Appendixmentioning
confidence: 99%
See 1 more Smart Citation
“…where ω is the weight matrix, b is the bias term, Ф is the nonlinear transformation from an n-dimensional space to a higher-dimensional feature space, Γ is the cost function, ε is the allowable error, and C is a constant that determines the tradeoff between the minimal training error and minimal model complexity ||ω|| 2 . The vectors outside the ε-tube can be obtained by using the slack variables ξ i .…”
Section: Appendixmentioning
confidence: 99%
“…In this study, used car data were used to develop a used car price prediction system. Machine learning (ML) models [1][2][3][4] were used to enhance the learning ability. In addition, Fuzzy was also applied to help retrieve the features.…”
Section: Introductionmentioning
confidence: 99%
“…In study [ 24 ], a novel MFO-RELM approach was presented for cyber-security threat detection and classification in the IoT platform. The proposed MFO-RELM approach achieves the effective detection of cybersecurity attacks that occur in the IoT platform.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Además, existen otras ICT que comparten el objetivo de generar accesibilidad eficiente a la información, como los recommender systems, que son herramientas cuya utilidad se basa en el filtrado de información relevante para facilitar la toma de decisiones y que han demostrado ser eficientes en temas de energía, salud y tráfico [29]. Con respecto a la recolección masiva de datos que el IoT produce puede ser utilizada de múltiples formas beneficiosas para el desarrollo de la sociedad, empero, representa un riesgo para los usuarios, por lo que el incremento en la utilización genera la necesidad de desarrollar a la par herramientas de ciberseguridad capaces de brindar protección [31].…”
Section: Acerca De Las Ictunclassified