2021
DOI: 10.1007/978-981-15-9647-6_92
|View full text |Cite
|
Sign up to set email alerts
|

IoT-Based Water Quality Monitoring System Using LoRaWAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…M. El-Shrkaway et al [8] proposed the Multi-layer Feature Selection and Reduction IDS (MFSR-IDS) algorithm to provide a high level of protection against DoS and Probe attacks using an anomaly-based approach. Liloja et al [11] developed an effective intrusion detector using both a deep learning model and a machine learning model. To obtain high-accuracy scores, a deep learning model was used in the process of extracting features, and a machine learning model was used to measure the intrusion detection performance of intrusion detection.…”
Section: Ml-based Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…M. El-Shrkaway et al [8] proposed the Multi-layer Feature Selection and Reduction IDS (MFSR-IDS) algorithm to provide a high level of protection against DoS and Probe attacks using an anomaly-based approach. Liloja et al [11] developed an effective intrusion detector using both a deep learning model and a machine learning model. To obtain high-accuracy scores, a deep learning model was used in the process of extracting features, and a machine learning model was used to measure the intrusion detection performance of intrusion detection.…”
Section: Ml-based Intrusion Detectionmentioning
confidence: 99%
“…To address this problem, researchers have leveraged machine learning algorithms on intrusion detection systems to analyze incoming network traffic to identify suspicious or anomalous activities in IoT environments [8][9][10][11][12]. Based on the labeled data categorizing packets as either benign or malicious, these models acquire the ability to discern patterns associated with different types of attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The most common application of data mining is classification, in which patterns are detected based on their groups. Neural Networks work on the basis of artificial neurons [15,16]. Each node in the network is given the name neuron, the basic processing unit [17].…”
Section: Proposed Techniquementioning
confidence: 99%