2020
DOI: 10.1016/j.future.2020.02.017
|View full text |Cite
|
Sign up to set email alerts
|

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
148
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 305 publications
(149 citation statements)
references
References 23 publications
0
148
0
1
Order By: Relevance
“…In order to discretize the input time series x without losing the relative distance information, Buckman [3] proposed thermometer encodings. For an index j ∈ 1, .…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to discretize the input time series x without losing the relative distance information, Buckman [3] proposed thermometer encodings. For an index j ∈ 1, .…”
Section: Proposed Methodsmentioning
confidence: 99%
“…e IoT consumer products are no longer just the product only; it is the data, the product, the infrastructure, and the algorithms. ese IoT products have switched to connected technologies from analog one, therefore, introducing novel risks for consumers regarding potential safety, privacy, and security issues for discriminatory data [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…The dataset, NSL-KDD, which was used in the experiments, is formally recognized for the traditional network attack detection system. The study [13] proposed a framework to select the effective machine learning algorithm for identifying malicious activities in IoT environments. They mentioned that naïve Bayes is an effective algorithm for the anomaly detection system in their experiments.…”
Section: Related Workmentioning
confidence: 99%
“…Packets. ML algorithms are being in use for the identification of intrusion disturbing the organizations or its system [2,6,[40][41][42]. In this paper, a rough set approach is used to identify the attack on data packets.…”
Section: Rough Set Approach For Identification Of Attack On Datamentioning
confidence: 99%