2022
DOI: 10.1016/j.iot.2022.100528
|View full text |Cite
|
Sign up to set email alerts
|

Smart City Data Science: Towards data-driven smart cities with open research issues

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 76 publications
(43 citation statements)
references
References 70 publications
0
17
0
Order By: Relevance
“…The outcomes of any analytical algorithm are directly impacted by data preprocessing techniques such as data cleaning, and transforming, as well as ensuring data quality for modeling. To ensure that the data behave properly, it is crucial to carry out particular data pre-processing operations before feeding the data into the eventual AI model 155 . Therefore the question is -"How to effectively represent and feed cyber data to a machine learning or AI model by ensuring data quality for a better outcome in a particular cyber issue?…”
Section: Real-world Applications With Research Issuesmentioning
confidence: 99%
“…The outcomes of any analytical algorithm are directly impacted by data preprocessing techniques such as data cleaning, and transforming, as well as ensuring data quality for modeling. To ensure that the data behave properly, it is crucial to carry out particular data pre-processing operations before feeding the data into the eventual AI model 155 . Therefore the question is -"How to effectively represent and feed cyber data to a machine learning or AI model by ensuring data quality for a better outcome in a particular cyber issue?…”
Section: Real-world Applications With Research Issuesmentioning
confidence: 99%
“…For instance, a random forest [40] technique consists of multiple decision trees is used to detect anomalies [41,42]. Similarly, detecting denial of service attack [43], intrusions [44,45], smart city anomalies [1,46] the most popular forest technique can be used. The authors in [47] also offer a Bayesian networkbased ensemble learning solution for detecting XSS attacks with domain knowledge and threat intelligence.…”
Section: Classification and Regression Analysis In Cybersecuritymentioning
confidence: 99%
“…We live in the digital age, which, like anything else, has its upsides and downsides. The main drawback is the security risk [1,2]. As more of our sensitive information transfers to the digital arena, security breaches are becoming more common and catastrophic.…”
Section: Introductionmentioning
confidence: 99%
“…For example, Sarker et al [ 18 ] explained the concept of a smart city in their research study. At first, they explained the concept of a smart city.…”
Section: Basics and The Backgroundmentioning
confidence: 99%