Publisher
Springer Science and Business Media LLC
Reference25 articles.
1. Singh KP, Tomar S, Jain U, Hussain M. Simplified and secure session key sharing for the Internet of Things (IoT) networks. In: International conference on internet of things and connected technologies. Berlin: Springer; 2020. p. 319–32.
2. Kumar A, Lim TJ. EDIMA: early detection of IoT malware network activity using machine learning techniques. IEEE World Forum Internet of Things (WF-IoT). 2019. https://doi.org/10.1109/WF-IoT.2019.8767194.
3. Chang H, Feng J, Chaofan D. HADIoT: a hierarchical anomaly detection framework for IoT. IEEE Access. 2020. https://doi.org/10.1109/ACCESS.2020.3017763.
4. Depren O, Topallar M, Anarim E, Ciliz MK. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst Appl. 2005;29:713–22. https://doi.org/10.1016/j.eswa.2005.05.002.
5. Denning DE. An intrusion-detection model. In: IEEE Symposium on Security and Privacy, 1986, pp. 118–131.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献