CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment
Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new
capabilities to different industries. The number of IoT solutions in areas such as …
capabilities to different industries. The number of IoT solutions in areas such as …
Datasets are not enough: Challenges in labeling network traffic
In contrast to previous surveys, the present work is not focused on reviewing the datasets
used in the network security field. The fact is that many of the available public labeled …
used in the network security field. The fact is that many of the available public labeled …
Ensemble machine learning techniques for accurate and efficient detection of botnet attacks in connected computers
S Afrifa, V Varadarajan, P Appiahene, T Zhang… - Eng, 2023 - mdpi.com
The transmission of information, ideas, and thoughts requires communication, which is a
crucial component of human contact. The utilization of Internet of Things (IoT) devices is a …
crucial component of human contact. The utilization of Internet of Things (IoT) devices is a …
[PDF][PDF] A Novel Data Preprocessing Model for Lightweight Sensory IoT Intrusion Detection
SA Khanday, H Fatima, N Rakesh - Int. J. Math. Eng. Manag. Sci, 2024 - researchgate.net
IoT devices or sensor nodes are essential components of the machine learning (ML)
application workflow because they gather abundant information for building models with …
application workflow because they gather abundant information for building models with …
Data balancing and hyper-parameter optimization for machine learning algorithms for secure iot networks
O Elghalhoud, K Naik, M Zaman, N Goel - Proceedings of the 18th ACM …, 2022 - dl.acm.org
Nowadays, many industries rely on machine learning (ML) algorithms and their ability to
learn from existing data to make inferences about new unlabeled data. Applying ML …
learn from existing data to make inferences about new unlabeled data. Applying ML …
Enhancing SIoT Security Through Advanced Machine Learning Techniques for Intrusion Detection
This study delves into the intricacies of SIoT networks, characterized by diverse data
modalities, sensor data, device interactions, and social connections. In order to address …
modalities, sensor data, device interactions, and social connections. In order to address …