Related references
Note: Only part of the references are listed.A Distributed Deep Learning System for Web Attack Detection on Edge Devices
Zhihong Tian et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City
Jing Qiu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles
Zhihong Tian et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Data mining and machine learning methods for sustainable smart cities traffic classification: A survey
Survey Muhammad Shafiq et al.
SUSTAINABLE CITIES AND SOCIETY (2020)
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Muhammad Shafiq et al.
COMPUTERS & SECURITY (2020)
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
Muhammad Shafiq et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
A Survey on Access Control in the Age of Internet of Things
Jing Qiu et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
An integrated Shannon entropy and TOPSIS for product design concept evaluation based on bijective soft set
Varun Tiwari et al.
JOURNAL OF INTELLIGENT MANUFACTURING (2019)
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services
Qingfeng Tan et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
A data-driven method for future Internet route decision modeling
Zhihong Tian et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment
Zhihong Tian et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory
Zhihong Tian et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
A Correlation-Change Based Feature Selection Method for IoT Equipment Anomaly Detection
Shen Su et al.
APPLIED SCIENCES-BASEL (2019)
A machine learning approach for feature selection traffic classification using security analysis
Muhammad Shafiq et al.
JOURNAL OF SUPERCOMPUTING (2018)
Intelligent IoT Traffic Classification Using Novel Search Strategy for Fast-Based-Correlation Feature Selection in Industrial Environments
Santiago Egea et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
Yair Meidan et al.
IEEE PERVASIVE COMPUTING (2018)
Effective Feature Selection for 5G IM Applications Traffic Classification
Muhammad Shafiq et al.
MOBILE INFORMATION SYSTEMS (2017)
Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification
Muhammad Shafiq et al.
MOBILE INFORMATION SYSTEMS (2017)
A New Type-2 Soft Set: Type-2 Soft Graphs and Their Applications
Khizar Hayat et al.
ADVANCES IN FUZZY SYSTEMS (2017)
Effectiveness of Statistical Features for Early Stage Internet Traffic Identification
Lizhi Peng et al.
INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING (2016)
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
Mohammad Abu Alsheikh et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Feature selection for optimizing traffic classification
Hongli Zhang et al.
COMPUTER COMMUNICATIONS (2012)
The bijective soft set with its operations
Ke Gong et al.
COMPUTERS & MATHEMATICS WITH APPLICATIONS (2010)
Developing a fuzzy TOPSIS approach based on subjective weights and objective weights
Tien-Chin Wang et al.
EXPERT SYSTEMS WITH APPLICATIONS (2009)
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
Xiaojiang Du et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
Security in wireless sensor networks
Xiaojiang Du et al.
IEEE WIRELESS COMMUNICATIONS (2008)
Internet protocol television (IPTV): The killer application for the next-generation Internet
Yang Xiao et al.
IEEE COMMUNICATIONS MAGAZINE (2007)
A survey of key management schemes in wireless sensor networks
Yang Xiao et al.
COMPUTER COMMUNICATIONS (2007)
A fuzzy soft set theoretic approach to decision making problems
A. R. Roy et al.
JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS (2007)
An effective key management scheme for heterogeneous sensor networks
Xiaojiang Du et al.
AD HOC NETWORKS (2007)