2023
DOI: 10.1016/j.engappai.2022.105670
|View full text |Cite
|
Sign up to set email alerts
|

RepuTE: A soft voting ensemble learning framework for reputation-based attack detection in fog-IoT milieu

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…Verma and Chandra [20] developed an algorithm called RepuTE for the IoT, which enables the detection of DoS/DDoS and Sybil attacks. In the presented RepuTe algorithm, live traffic coming from the IoT layer is transferred to the fog layer and the traffic data is first pre-processed in this layer.…”
Section: Related Workmentioning
confidence: 99%
“…Verma and Chandra [20] developed an algorithm called RepuTE for the IoT, which enables the detection of DoS/DDoS and Sybil attacks. In the presented RepuTe algorithm, live traffic coming from the IoT layer is transferred to the fog layer and the traffic data is first pre-processed in this layer.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, Decision Tree is a classification model that understands the relationships between attributes in data and is used to make decisions based on the constructed decision tree (Pasha et al, 2023;Pratama et al, 2022). The soft voting method combines the outputs of multiple classification algorithms to improve accuracy (Kumari et al, 2021;Verma et al, 2023). Previous research has shown that combining Gaussian Naive Bayes and Decision Tree using the soft voting method can produce more accurate predictions regarding soil fertility.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Verma and Chandra [ 24 ] proposed a RepuTE Framework tailored to bolster trust in the fog computing layer near users. This framework deploys a soft-voting ensemble learning model to classify and predict DoS/DDoS and Sybil attacks.…”
Section: Related Studiesmentioning
confidence: 99%