2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) 2022
DOI: 10.1109/iraset52964.2022.9738218
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning and Deep Learning Methods for Intrusion Detection Systems in IoMT: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(24 citation statements)
references
References 59 publications
0
13
0
Order By: Relevance
“…To determine the DEML model's overall efciency, various evaluation metrics are applied, as given in equations (32)(33)(34)(35)(36)(37). Te accuracy measure can be used to show the overall predicting capabilities of the ML models and the proposed fused weighted DEML model [51]. True positive (TP) and true negative (TN) determine the competence of the suggested classifer to predict the absence and presence of lung cancer disease in the confusion matrix.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…To determine the DEML model's overall efciency, various evaluation metrics are applied, as given in equations (32)(33)(34)(35)(36)(37). Te accuracy measure can be used to show the overall predicting capabilities of the ML models and the proposed fused weighted DEML model [51]. True positive (TP) and true negative (TN) determine the competence of the suggested classifer to predict the absence and presence of lung cancer disease in the confusion matrix.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Hameed for IDSs in the IoMT. They observe that many researchers develop their approaches in an isolated environment for a limited number of attacks [16]. Pelekoudas-Oikonomou et al review blockchain-based security mechanisms for IoMT edge networks.…”
Section: Related Workmentioning
confidence: 99%
“…There are many researchers who have provided good overviews in the arena of IoMT. Shamsoshoara et al [ 18 ] provided security measures using PUF; Fernández-Caramés et al [ 19 ] showed the challenges of security measures; Alwarafy et al [ 20 ] presented intrusion detection using edge computing; Shakeel et al [ 21 ] showed security systems in limited scale; Al-Garadi et al [ 22 ], Arora et al [ 23 ], and Rbah et al [ 24 ] presented deep-learning based intrusion detection system; and only blockchain-based measures are presented by Sengupta et al [ 17 ], Sawadi et al [ 25 ], and Khor et al [ 26 ]. This paper presents not only the issues and challenges of IoMT application that are highlighted, but security and privacy risks with both centralized and decentralized solutions are presented.…”
Section: Contributionsmentioning
confidence: 99%