[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Alalhareth et al., 2023 - Google Patents

An improved mutual information feature selection technique for intrusion detection systems in the Internet of Medical Things

Alalhareth et al., 2023

View HTML
Document ID
14614756996639407265
Author
Alalhareth M
Hong S
Publication year
Publication venue
Sensors

External Links

Snippet

In healthcare, the Internet of Things (IoT) is used to remotely monitor patients and provide real-time diagnoses, which is referred to as the Internet of Medical Things (IoMT). This integration poses a risk from cybersecurity threats that can harm patient data and well-being …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/34Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/10Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints

Similar Documents

Publication Publication Date Title
Song et al. Analysis of autoencoders for network intrusion detection
Aldhaheri et al. DeepDCA: novel network-based detection of IoT attacks using artificial immune system
Alghazzawi et al. Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection
Chaganti et al. A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things
Sudqi Khater et al. A lightweight perceptron-based intrusion detection system for fog computing
Thapa et al. Comparison of machine learning and deep learning models for network intrusion detection systems
Zheng et al. An improved LDA-based ELM classification for intrusion detection algorithm in IoT application
Fotiadou et al. Network traffic anomaly detection via deep learning
Alalhareth et al. An improved mutual information feature selection technique for intrusion detection systems in the Internet of Medical Things
Musafer et al. An enhanced design of sparse autoencoder for latent features extraction based on trigonometric simplexes for network intrusion detection systems
Alabsi et al. CNN-CNN: dual convolutional neural network approach for feature selection and attack detection on internet of things networks
Alsulami et al. An intrusion detection and classification system for IoT traffic with improved data engineering
Rao et al. An imbalanced generative adversarial network-based approach for network intrusion detection in an imbalanced dataset
Palla et al. Intelligent Mirai malware detection for IoT nodes
Shah et al. Network intrusion detection through discriminative feature selection by using sparse logistic regression
Al-Qudah et al. Effective one-class classifier model for memory dump malware detection
Talaei Khoei et al. A comparative analysis of supervised and unsupervised models for detecting attacks on the intrusion detection systems
Alkahtani et al. Developing cybersecurity systems based on machine learning and deep learning algorithms for protecting food security systems: industrial control systems
Verma et al. A novel intrusion detection approach using machine learning ensemble for IoT environments
Yaser et al. Improved DDoS detection utilizing deep neural networks and feedforward neural networks as autoencoder
Sarwar et al. Enhanced anomaly detection system for iot based on improved dynamic SBPSO
Lee et al. Cybersecurity threats based on machine learning-based offensive technique for password authentication
Cheng et al. Cyber situation comprehension for IoT systems based on APT alerts and logs correlation
Al-Taleb et al. Towards a hybrid machine learning model for intelligent cyber threat identification in smart city environments
Liu et al. Real-time anomaly detection of network traffic based on CNN