Search Results - (( _ application model algorithm ) OR ( iot application learning algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
- application model »
- model algorithm »
- iot application »
-
1
-
2
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
Review -
3
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). …”
Get full text
Get full text
Get full text
Article -
5
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Here, the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model. …”
Get full text
Get full text
Get full text
Article -
6
Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT)
Published 2021“…As the chosen model to be implemented in this analysis, the Q-learning algorithm proposal offers a possible solution for addressing evolving IoT environments and configurations. …”
Get full text
Get full text
Conference or Workshop Item -
7
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026Get full text
Get full text
Get full text
Proceeding Paper -
8
Smart agriculture: precision farming through sensor-based crop monitoring and control system
Published 2024“…Subsequently, four distinct algorithms are trained with the collected dataset to ascertain the most optimal algorithm for predicting crop growth and harvesting time, resulting in the selection of the Random Forest Regression model, which attains the highest model score of 86%. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
-
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
15
Towards paddy rice smart farming: a review on big data, machine learning, and rice production tasks
Published 2021“…We describe the data captured and elaborate role of machine learning algorithms in paddy rice smart agriculture, by analyzing the applications of machine learning in various scenarios, smart irrigation for paddy rice, predicting paddy rice yield estimation, monitoring paddy rice growth, monitoring paddy rice disease, assessing quality of paddy rice and paddy rice sample classification. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article
