4.8 Article

CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

A Distributed Deep Learning System for Web Attack Detection on Edge Devices

Zhihong Tian et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City

Jing Qiu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles

Zhihong Tian et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Construction & Building Technology

Data mining and machine learning methods for sustainable smart cities traffic classification: A survey

Survey Muhammad Shafiq et al.

SUSTAINABLE CITIES AND SOCIETY (2020)

Article Computer Science, Information Systems

IoT malicious traffic identification using wrapper-based feature selection mechanisms

Muhammad Shafiq et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Theory & Methods

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city

Muhammad Shafiq et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

A Survey on Access Control in the Age of Internet of Things

Jing Qiu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Artificial Intelligence

An integrated Shannon entropy and TOPSIS for product design concept evaluation based on bijective soft set

Varun Tiwari et al.

JOURNAL OF INTELLIGENT MANUFACTURING (2019)

Article Computer Science, Information Systems

Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services

Qingfeng Tan et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

A data-driven method for future Internet route decision modeling

Zhihong Tian et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Automation & Control Systems

Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment

Zhihong Tian et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Engineering, Electrical & Electronic

Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory

Zhihong Tian et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Chemistry, Multidisciplinary

A Correlation-Change Based Feature Selection Method for IoT Equipment Anomaly Detection

Shen Su et al.

APPLIED SCIENCES-BASEL (2019)

Article Computer Science, Hardware & Architecture

A machine learning approach for feature selection traffic classification using security analysis

Muhammad Shafiq et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Computer Science, Information Systems

Intelligent IoT Traffic Classification Using Novel Search Strategy for Fast-Based-Correlation Feature Selection in Industrial Environments

Santiago Egea et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders

Yair Meidan et al.

IEEE PERVASIVE COMPUTING (2018)

Article Computer Science, Information Systems

Effective Feature Selection for 5G IM Applications Traffic Classification

Muhammad Shafiq et al.

MOBILE INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification

Muhammad Shafiq et al.

MOBILE INFORMATION SYSTEMS (2017)

Article Computer Science, Artificial Intelligence

A New Type-2 Soft Set: Type-2 Soft Graphs and Their Applications

Khizar Hayat et al.

ADVANCES IN FUZZY SYSTEMS (2017)

Article Computer Science, Theory & Methods

Effectiveness of Statistical Features for Early Stage Internet Traffic Identification

Lizhi Peng et al.

INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING (2016)

Article Computer Science, Information Systems

Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

Mohammad Abu Alsheikh et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Feature selection for optimizing traffic classification

Hongli Zhang et al.

COMPUTER COMMUNICATIONS (2012)

Article Mathematics, Applied

The bijective soft set with its operations

Ke Gong et al.

COMPUTERS & MATHEMATICS WITH APPLICATIONS (2010)

Article Computer Science, Artificial Intelligence

Developing a fuzzy TOPSIS approach based on subjective weights and objective weights

Tien-Chin Wang et al.

EXPERT SYSTEMS WITH APPLICATIONS (2009)

Article Engineering, Electrical & Electronic

A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks

Xiaojiang Du et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Computer Science, Hardware & Architecture

Security in wireless sensor networks

Xiaojiang Du et al.

IEEE WIRELESS COMMUNICATIONS (2008)

Article Engineering, Electrical & Electronic

Internet protocol television (IPTV): The killer application for the next-generation Internet

Yang Xiao et al.

IEEE COMMUNICATIONS MAGAZINE (2007)

Article Computer Science, Information Systems

A survey of key management schemes in wireless sensor networks

Yang Xiao et al.

COMPUTER COMMUNICATIONS (2007)

Article Mathematics, Applied

A fuzzy soft set theoretic approach to decision making problems

A. R. Roy et al.

JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS (2007)

Article Computer Science, Information Systems

An effective key management scheme for heterogeneous sensor networks

Xiaojiang Du et al.

AD HOC NETWORKS (2007)