2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) 2022
DOI: 10.1109/ic3iot53935.2022.9767727
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning and Deep Learning framework with Feature Selection for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Another method of security in big data is to create trust between the sender and the receiver. Many methods such as data mining [10], supervised [11] and unsupervised [12] machine learning algorithms have been used for the trust in data quality. Trust plays an important role in the security [12]- [14].…”
Section: Introductionmentioning
confidence: 99%
“…Another method of security in big data is to create trust between the sender and the receiver. Many methods such as data mining [10], supervised [11] and unsupervised [12] machine learning algorithms have been used for the trust in data quality. Trust plays an important role in the security [12]- [14].…”
Section: Introductionmentioning
confidence: 99%