Banaamah et al., 2022 - Google Patents
Intrusion detection in iot using deep learningBanaamah et al., 2022
View HTML- Document ID
- 17569662665548208029
- Author
- Banaamah A
- Ahmad I
- Publication year
- Publication venue
- Sensors
External Links
Snippet
Cybersecurity has been widely used in various applications, such as intelligent industrial systems, homes, personal devices, and cars, and has led to innovative developments that continue to face challenges in solving problems related to security methods for IoT devices …
- 238000001514 detection method 0 title abstract description 60
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Banaamah et al. | Intrusion detection in iot using deep learning | |
Bourou et al. | A review of tabular data synthesis using GANs on an IDS dataset | |
Larriva-Novo et al. | An IoT-focused intrusion detection system approach based on preprocessing characterization for cybersecurity datasets | |
Chaganti et al. | A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things | |
Gao et al. | Research on network intrusion detection based on incremental extreme learning machine and adaptive principal component analysis | |
Hoang et al. | Botnet detection based on machine learning techniques using DNS query data | |
Alkahtani et al. | Artificial intelligence algorithms for malware detection in android-operated mobile devices | |
Alzubi et al. | Optimized machine learning-based intrusion detection system for fog and edge computing environment | |
Lee et al. | AE-CGAN model based high performance network intrusion detection system | |
Wang et al. | Network anomaly intrusion detection based on deep learning approach | |
Shah et al. | Deep learning-based malicious smart contract and intrusion detection system for IoT environment | |
Alsulami et al. | An intrusion detection and classification system for IoT traffic with improved data engineering | |
Attou et al. | Towards an intelligent intrusion detection system to detect malicious activities in cloud computing | |
Balla et al. | The effect of dataset imbalance on the performance of scada intrusion detection systems | |
Popoola et al. | Memory-efficient deep learning for botnet attack detection in IoT networks | |
Paulauskas et al. | Application of histogram-based outlier scores to detect computer network anomalies | |
Afrifa et al. | Ensemble machine learning techniques for accurate and efficient detection of botnet attacks in connected computers | |
Sagu et al. | A hybrid deep learning model with self-improved optimization algorithm for detection of security attacks in IoT environment | |
Al-Taleb et al. | Towards a hybrid machine learning model for intelligent cyber threat identification in smart city environments | |
Jove et al. | Intelligent one-class classifiers for the development of an intrusion detection system: the mqtt case study | |
Mari et al. | Development of a machine-learning intrusion detection system and testing of its performance using a generative adversarial network | |
Rihan et al. | Approach for detecting attacks on IoT networks based on ensemble feature selection and deep learning models | |
Yang et al. | SPE-ACGAN: A resampling approach for class imbalance problem in network intrusion detection systems | |
Wang et al. | Hybrid intrusion detection system based on combination of random forest and autoencoder | |
Rabie et al. | A proficient ZESO-DRKFC model for smart grid SCADA security |