ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Enhancing IoT Botnets Attack Detection Using Machine Learning-IDS and Ensemble Data Preprocessing Technique
Internet of Things—Applications and Future - Lecture Notes in Networks and Systems
◽
10.1007/978-981-15-3075-3_6
◽
2020
◽
pp. 89-102
Author(s):
Noha A. Hikal
◽
M. M. Elgayar
Keyword(s):
Machine Learning
◽
Data Preprocessing
◽
Attack Detection
◽
Ensemble Data
◽
Preprocessing Technique
Download Full-text
Related Documents
Cited By
References
Short-term streamflow time series prediction model by machine learning tool based on data preprocessing technique and swarm intelligence algorithm
Hydrological Sciences Journal
◽
10.1080/02626667.2020.1828889
◽
2020
◽
Vol 65
(15)
◽
pp. 2590-2603
Author(s):
Wen-Jing Niu
◽
Zhong-Kai Feng
◽
Wen-Fa Yang
◽
Jun Zhang
Keyword(s):
Machine Learning
◽
Time Series
◽
Prediction Model
◽
Swarm Intelligence
◽
Time Series Prediction
◽
Data Preprocessing
◽
Short Term
◽
Preprocessing Technique
◽
Swarm Intelligence Algorithm
◽
Machine Learning Tool
Download Full-text
Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques
Soft Computing
◽
10.1007/s00500-021-05926-8
◽
2021
◽
Author(s):
Ahmad Ali AlZubi
◽
Mohammed Al-Maitah
◽
Abdulaziz Alarifi
Keyword(s):
Machine Learning
◽
Physical System
◽
Attack Detection
◽
Machine Learning Techniques
◽
Cyber Physical System
◽
Cyber Attack
◽
Learning Techniques
Download Full-text
Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN
2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
◽
10.1109/nfv-sdn50289.2020.9289908
◽
2020
◽
Author(s):
Samer Y Khamaiseh
◽
Izzat Alsmadi
◽
Abdullah Al-Alaj
Keyword(s):
Machine Learning
◽
Attack Detection
◽
Detection Systems
Download Full-text
Web Attack Detection through Network-Traffic-Based Feature Engineering and Machine Learning
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
◽
10.1145/3444370.3444555
◽
2020
◽
Author(s):
Jian Yang
◽
Hao Wang
◽
Yueming Lu
Keyword(s):
Machine Learning
◽
Network Traffic
◽
Attack Detection
◽
Feature Engineering
Download Full-text
Using a machine learning proxy for localization in ensemble data assimilation
Computational Geosciences
◽
10.1007/s10596-020-10031-0
◽
2021
◽
Vol 25
(3)
◽
pp. 931-944
Author(s):
Johann M. Lacerda
◽
Alexandre A. Emerick
◽
Adolfo P. Pires
Keyword(s):
Machine Learning
◽
Data Assimilation
◽
Ensemble Data Assimilation
◽
Ensemble Data
Download Full-text
Active Machine Learning Adversarial Attack Detection in the User Feedback Process
IEEE Access
◽
10.1109/access.2021.3063002
◽
2021
◽
pp. 1-1
Author(s):
Victor R. Kebande
◽
Sadi Alawadi
◽
Feras Awaysheh
◽
Jan A. Persson
Keyword(s):
Machine Learning
◽
User Feedback
◽
Attack Detection
◽
Feedback Process
◽
Adversarial Attack
Download Full-text
Statistical Boosting: A Preprocessing Technique to Enhance Performance of Machine Learning and Deep Learning Models on Partially Occluded Traffic Signs
2020 IEEE 23rd International Multitopic Conference (INMIC)
◽
10.1109/inmic50486.2020.9318174
◽
2020
◽
Author(s):
Abdul Mannan
◽
Kashif Javed
◽
Serosh Karim Noon
Keyword(s):
Machine Learning
◽
Deep Learning
◽
Learning Models
◽
Traffic Signs
◽
Preprocessing Technique
◽
Partially Occluded
Download Full-text
A Machine Learning Approach for Backoff Manipulation Attack Detection in Cognitive Radio
IEEE Access
◽
10.1109/access.2020.3046637
◽
2020
◽
Vol 8
◽
pp. 227349-227359
Author(s):
Wassim Fassi Fihri
◽
Hassan El Ghazi
◽
Badr Abou El Majd
◽
Faissal El Bouanani
Keyword(s):
Machine Learning
◽
Cognitive Radio
◽
Attack Detection
◽
Learning Approach
◽
Machine Learning Approach
Download Full-text
Botnet attack detection in Internet of Things devices over cloud environment via machine learning
Concurrency and Computation Practice and Experience
◽
10.1002/cpe.6662
◽
2021
◽
Author(s):
Muhammad Waqas
◽
Kamlesh Kumar
◽
Asif Ali Laghari
◽
Umair Saeed
◽
Muhammad Malook Rind
◽
...
Keyword(s):
Machine Learning
◽
Internet Of Things
◽
Attack Detection
◽
Cloud Environment
Download Full-text
Insider Attack: Internal Cyber Attack Detection Using Machine Learning
10.1109/icccnt51525.2021.9579549
◽
2021
◽
Author(s):
P. Varsha Suresh
◽
Minu Lalitha Madhavu
Keyword(s):
Machine Learning
◽
Attack Detection
◽
Cyber Attack
◽
Insider Attack
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close