Author:
Hussein Bashar Rasheed,Isam Mustafa,Alanssari Ali Ihsan,Abidi Nazia Abbas
Publisher
Springer Nature Singapore
Reference33 articles.
1. Iwendi C, Ponnan S, Munirathinam R, Srinivasan K, Chang C-Y (2019) An efficient and unique TF/IDF algorithmic model-based data analysis for handling applications with big data streaming. Electronics 8(11):1331
2. Mohit M, Saraswat LK, Iwendi C, Anajemba JH (2019) A neuro-fuzzy approach for intrusion detection in energy efficient sensor routing. In: 4th International conference on internet of things: smart innovation and usages (IoT-SIU), Ghaziabad, India, pp 1–5
3. Rehman A, Rehman SU, Khan M, Alazab M, Reddy GT (2021) CANintelliIDS: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng 8(2):1456–1466
4. Deepa N, Pham Q-V, Nguyen DC et al (2020) A survey on blockchain for big data: approaches, opportunities, and future directions. https://arxiv.org/abs/2009.00858
5. Iwendi C, Khan S, Anajemba JH, Mittal M, Alenezi M, Alazab M (2020) The use of ensemble models for multiple class and binary class classification for improving intrusion detection systems. Sensors 20(9):2559