2021
DOI: 10.14569/ijacsa.2021.0120748
|View full text |Cite
|
Sign up to set email alerts
|

IoT-based Cyber-security of Drones using the Naïve Bayes Algorithm

Abstract: Recent advancements in drone technology are opening new opportunities and applications: in various fields of life especially in the form of small drones. However, these advancements are also causing new challenges in terms of security, adaptability, and consistency. Small drones are proving to be a new opportunity for the civil and military industries. The small drones are suffering from architectural issues and the definition of security and safety issues. The rapid growth of the Internet of things opens new … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…K-nearest neighbours (KNN) method is the classification method used to classify the incoming entry as normal or malicious entry [50]. Naïve Bayes is a statistical method that uses a probabilistic method based on the Bayesian theory; the probability of a field prone to attack can be calculated [51]. Support vector machine (SVM) is a classification method that separates the intrusions and normal entries from the dataset.…”
Section: Artificial Intelligence For Cyber Securitymentioning
confidence: 99%
“…K-nearest neighbours (KNN) method is the classification method used to classify the incoming entry as normal or malicious entry [50]. Naïve Bayes is a statistical method that uses a probabilistic method based on the Bayesian theory; the probability of a field prone to attack can be calculated [51]. Support vector machine (SVM) is a classification method that separates the intrusions and normal entries from the dataset.…”
Section: Artificial Intelligence For Cyber Securitymentioning
confidence: 99%
“…The k-nearest neighbours (KNN) method is used to classify the incoming entry as normal or malicious entry [50]. Naïve Bayes is a statistical method that uses a probabilistic method based on the Bayesian theory; the probability of a field prone to attack can be calculated [51]. Support vector machine (SVM) is a classification method that separates the intrusions and normal entries from the dataset.…”
Section: Artificial Intelligence For Cyber Securitymentioning
confidence: 99%
“…Data mining is the act of discovering patterns that have the potential to be beneficial for managing massive databases (Syafar et al, 2015;Windarto & Herawan, 2022). Data mining classification approaches, such as the C4.5 algorithm (Aziz & Lawi, 2022;Hasanah et al, 2020), Naive Bayes (Kewsuwun & Kajornkasirat, 2022;Majeed et al, 2021), Neural Network (Hardiyanto et al, 2021;Perdana et al, 2021;Windarto et al, 2018) and K-NN (Atalaya et al, 2022;Varzaneh et al, 2022), are widely utilized by researchers in the solution of problems. Classification approach is also among the most researched algorithms.…”
Section: Introductionmentioning
confidence: 99%