2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing &Amp; Communicatio 2022
DOI: 10.1109/icatiece56365.2022.10046735
|View full text |Cite
|
Sign up to set email alerts
|

Effective Cyber Attack Detection in an IoMT-Smart System using Deep Convolutional Neural Networks and Machine Learning Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…], Radoglou-Grammatikis et al[97] Radoglou-Grammatikis et al[98], Rahmadika et al[99], Ram and Kumar[100], Rao et al[101], Rao et al[102], Ravi et al[103], Rehman et al[104], Saba[105], Saheed and Arowolo[106], Said et al[107], Salem and Mehaoua[108], Schneble and Thamilarasu[109], Sehatbakhsh et al[110], Sharma et al[111], Singh et al[112], Siniosoglou et al[113], Spegni et al[114], Tabassum et al[115], Tahir et al[116], Thamilarasu et al[117], Thamilarasu et al[24], Thapa et al[118], Toor et al[119], Wa Umba et al[120], Wagan et al [121], Wahab et al [122], Wang et al [123], Yan et al [124], Zaabar et al [125], Zachos et al [126], Zubair et al [127] 99 Specification-based Abdulhammed et al [128], Choudhary et al [129], Fang et al [130], Mitchell and Chen [29], Mitchell and Chen [131], Li et al [132], Raiyat Aliabadi et al [133], You et al [134], Zhang et al [135] 9 Signature-based Boujrad et al [136], Meng et al [25], Mpungu et al [137], Zhang et al [138] 4 Hybrid Begli et al [139], Chen et al [140], Dupont et al [141], Meng et al [142], Kolokotronis et al [143], Lakka et al [144], Tariq et al [145] 7 researchers substantiate why their approach works best (e.g., Saheed et al with their swarm-based approach [106]), others focus on optimizing parts of their approach. E.g., Priya et al measure the benefits of different dimensionality reduction approaches [96].…”
mentioning
confidence: 99%
“…], Radoglou-Grammatikis et al[97] Radoglou-Grammatikis et al[98], Rahmadika et al[99], Ram and Kumar[100], Rao et al[101], Rao et al[102], Ravi et al[103], Rehman et al[104], Saba[105], Saheed and Arowolo[106], Said et al[107], Salem and Mehaoua[108], Schneble and Thamilarasu[109], Sehatbakhsh et al[110], Sharma et al[111], Singh et al[112], Siniosoglou et al[113], Spegni et al[114], Tabassum et al[115], Tahir et al[116], Thamilarasu et al[117], Thamilarasu et al[24], Thapa et al[118], Toor et al[119], Wa Umba et al[120], Wagan et al [121], Wahab et al [122], Wang et al [123], Yan et al [124], Zaabar et al [125], Zachos et al [126], Zubair et al [127] 99 Specification-based Abdulhammed et al [128], Choudhary et al [129], Fang et al [130], Mitchell and Chen [29], Mitchell and Chen [131], Li et al [132], Raiyat Aliabadi et al [133], You et al [134], Zhang et al [135] 9 Signature-based Boujrad et al [136], Meng et al [25], Mpungu et al [137], Zhang et al [138] 4 Hybrid Begli et al [139], Chen et al [140], Dupont et al [141], Meng et al [142], Kolokotronis et al [143], Lakka et al [144], Tariq et al [145] 7 researchers substantiate why their approach works best (e.g., Saheed et al with their swarm-based approach [106]), others focus on optimizing parts of their approach. E.g., Priya et al measure the benefits of different dimensionality reduction approaches [96].…”
mentioning
confidence: 99%