[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Banaamah et al., 2022 - Google Patents

Intrusion detection in iot using deep learning

Banaamah et al., 2022

View HTML
Document ID
17569662665548208029
Author
Banaamah A
Ahmad I
Publication year
Publication venue
Sensors

External Links

Snippet

Cybersecurity has been widely used in various applications, such as intelligent industrial systems, homes, personal devices, and cars, and has led to innovative developments that continue to face challenges in solving problems related to security methods for IoT devices …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/10Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints

Similar Documents

Publication Publication Date Title
Banaamah et al. Intrusion detection in iot using deep learning
Bourou et al. A review of tabular data synthesis using GANs on an IDS dataset
Larriva-Novo et al. An IoT-focused intrusion detection system approach based on preprocessing characterization for cybersecurity datasets
Chaganti et al. A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things
Gao et al. Research on network intrusion detection based on incremental extreme learning machine and adaptive principal component analysis
Hoang et al. Botnet detection based on machine learning techniques using DNS query data
Alkahtani et al. Artificial intelligence algorithms for malware detection in android-operated mobile devices
Alzubi et al. Optimized machine learning-based intrusion detection system for fog and edge computing environment
Lee et al. AE-CGAN model based high performance network intrusion detection system
Wang et al. Network anomaly intrusion detection based on deep learning approach
Shah et al. Deep learning-based malicious smart contract and intrusion detection system for IoT environment
Alsulami et al. An intrusion detection and classification system for IoT traffic with improved data engineering
Attou et al. Towards an intelligent intrusion detection system to detect malicious activities in cloud computing
Balla et al. The effect of dataset imbalance on the performance of scada intrusion detection systems
Popoola et al. Memory-efficient deep learning for botnet attack detection in IoT networks
Paulauskas et al. Application of histogram-based outlier scores to detect computer network anomalies
Afrifa et al. Ensemble machine learning techniques for accurate and efficient detection of botnet attacks in connected computers
Sagu et al. A hybrid deep learning model with self-improved optimization algorithm for detection of security attacks in IoT environment
Al-Taleb et al. Towards a hybrid machine learning model for intelligent cyber threat identification in smart city environments
Jove et al. Intelligent one-class classifiers for the development of an intrusion detection system: the mqtt case study
Mari et al. Development of a machine-learning intrusion detection system and testing of its performance using a generative adversarial network
Rihan et al. Approach for detecting attacks on IoT networks based on ensemble feature selection and deep learning models
Yang et al. SPE-ACGAN: A resampling approach for class imbalance problem in network intrusion detection systems
Wang et al. Hybrid intrusion detection system based on combination of random forest and autoencoder
Rabie et al. A proficient ZESO-DRKFC model for smart grid SCADA security