Author:
Vu Ly,Nguyen Quang Uy,Hoang Dinh Thai,Nguyen Diep N.,Dutkiewicz Eryk
Publisher
Springer International Publishing
Reference40 articles.
1. N.C. Luong, D.T. Hoang, P. Wang, D. Niyato, D.I. Kim, Z. Han, Data collection and wireless communication in internet of things (IoT) using economic analysis and pricing models: a survey. IEEE Commun. Surv. Tutor. 18(4), 2546–2590 (2016)
2. 2018 annual cybersecurity report: the evolution of malware and rise of artificial intelligence. (2018). https://www.cisco.com/c/en_in/products/security/security-reports.html#~about-the-series. Accessed 10 May 2019
3. Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N.O. Tippenhauer, J.D. Guarnizo, Y. Elovici, Detection of unauthorized IoT devices using machine learning techniques (2017). Preprint arXiv:1709.04647
4. Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breitenbacher, Y. Elovici, N-BaIoT—network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervas. Comput. 17(3), 12–22 (2018)
5. N. Vlajic, D. Zhou, Iot as a land of opportunity for DDoS hackers. Computer 51(7), 26–34 (2018)