Search Results - (( _ application model algorithm ) OR ( iot application ((use algorithm) OR (tree algorithm)) ))*
Search alternatives:
- application model »
- model algorithm »
- iot application »
- tree algorithm »
- use algorithm »
-
1
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Our approach is evaluated on the UNSW-NB15 dataset, which contains 1,140,045 samples and is more recent and comprehensive than those used in previous works. Our system achieved an overall accuracy of 98, outperforming baseline models that used more advanced algorithms such as Random Forest and XGBoost. …”
Get full text
Get full text
Article -
2
-
3
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
4
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
Review -
7
-
8
Intersection Features For Android Botnet Classification
Published 2019“…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Get full text
Article -
9
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…The proposed model is useful in enhancing the existing MAC protocol to support dense IoT deployment of RFID.…”
Get full text
Get full text
Article -
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The proposed algorithm improved the response time, delay, number of offloaded tasks, throughput, and energy consumption of the IoT requests. …”
Get full text
Get full text
Article -
12
-
13
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Devices that use the internet of things for DNA sequence testing also require a high level of expertise in the application of public-key cryptography. …”
Get full text
Get full text
Get full text
Thesis -
14
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…The current security model in IoT networks uses centralized key exchange servers that present a security weak point. …”
Get full text
Get full text
Article -
15
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Here, the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model. …”
Get full text
Get full text
Get full text
Article -
16
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). …”
Get full text
Get full text
Get full text
Article -
17
Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT)
Published 2021“…As the chosen model to be implemented in this analysis, the Q-learning algorithm proposal offers a possible solution for addressing evolving IoT environments and configurations. …”
Get full text
Get full text
Conference or Workshop Item -
18
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026Get full text
Get full text
Get full text
Proceeding Paper -
19
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
