Author:
Begum Gousiya,Ul Huq S. Zahoor,Kumar A. P. Siva
Publisher
Springer Science and Business Media LLC
Reference36 articles.
1. Soe YN, Feng Y, Santosa PI, Hartanto R, Sakurai K (2019) Rule generation for signature based detection systems of cyber attacks in iot environments. Bull Netw Comput Syst Softw 8(2):93–97
2. Ali MM, El-Henawy IM, Salah A (2021) Usages of spark framework with different machine learning algorithms. Comput Intell Neurosci 2021. https://doi.org/10.1155/2021/1896953
3. Othman SM, Ba-Alwi FM, Alsohybe NT, Al-Hashida AY (2018) Intrusion detection model using machine learning algorithm on Big Data environment. J Big Data 5(1):1–12
4. Morfino V, Rampone S (2020) Towards near-real-time intrusion detection for IoT devices using supervised learning and apache spark. Electronics 9(3):444
5. Singh J, Singh J (2021) A survey on machine learning-based malware detection in executable files. J Syst Architect 112:101861
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure and Efficient IoT Networks: An AI and ML-based Intrusion Detection System;2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT);2024-05-03