2021 IEEE International Conference on Cyber Security and Resilience (CSR) 2021
DOI: 10.1109/csr51186.2021.9527964
|View full text |Cite
|
Sign up to set email alerts
|

Social Media Monitoring for IoT Cyber-Threats

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The Confusion matrix, which is also called the error matrix, is the matrix which is the formal way to represent the results of the classification model. The confusion matrix presented in Table 9 shows 143,145,151,152,155,164,170,174,175,183,184,185,186,194,197,199,202 -Easy to implement.…”
Section: Knnmentioning
confidence: 99%
See 1 more Smart Citation
“…The Confusion matrix, which is also called the error matrix, is the matrix which is the formal way to represent the results of the classification model. The confusion matrix presented in Table 9 shows 143,145,151,152,155,164,170,174,175,183,184,185,186,194,197,199,202 -Easy to implement.…”
Section: Knnmentioning
confidence: 99%
“…-Lower performance compared with other classifiers. 95,106,117,120,123,126,129,132,137,142,145,149,151,155,162,164,166,170,171,182,183,186,190,197,204,205 -Easy to implement.…”
Section: Knnmentioning
confidence: 99%
“…Borcherding et al [43] discussed various types of IoT threats, as well as shallow and deep (deep neural networks, deep belief networks, long short-term memory, and bidirectional LSTM)-based intrusion detection systems (IDS) for the IoT environment, including decision trees, random forests, and support vector machines [44].…”
Section: Threats In Iotmentioning
confidence: 99%
“…The researchers found that deep learning IDS outperformed shallow learning IDS in detecting IoT attacks. Kim-Hung Le et al [44] introduced IMIDS, a powerful intrusion detection system that uses a CNN. The purpose of this study was to identify various cyberattacks accurately using an IDS and an artificial method for generating useful training data.…”
Section: Countermeasures and Mitigation Techniques For The For Iot Th...mentioning
confidence: 99%