CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks
Author:
Affiliation:
1. Applied College, Najran University, King Abdulaziz Street, Najran P.O. Box 1988, Saudi Arabia
2. National Advanced IPv6 (NAv6) Centre, Universiti Sains Malaysia, Gelugor 11800, Malaysia
Abstract
Funder
Deanship of Scientific Research at Najran University
Publisher
MDPI AG
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Link
https://www.mdpi.com/1424-8220/23/14/6507/pdf
Reference48 articles.
1. Sarker, I.H., Khan, A.I., Abushark, Y.B., and Alsolami, F. (2022). Internet of things (iot) security intelligence: A comprehensive overview, machine learning solutions and research directions. Mob. Netw. Appl., 1–17.
2. Alternating sensing process to prolong the lifetime of wireless sensor networks;Anbar;J. Theor. Appl. Inf. Technol. (JATIT),2019
3. Al-Sarawi, S., Anbar, M., Abdullah, R., and Al Hawari, A.B. (2020, January 27–28). Internet of things market analysis forecasts, 2020–2030. Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK.
4. A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things;Anbar;Internet Things,2023
5. Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers;Zhang;Forensic Sci. Int. Digit. Investig.,2020
Cited by 25 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Novel machine learning investigation for Buongiorno fluidic model with Sutterby nanomaterial;Tribology International;2024-11
2. Discriminating feature ratio: Introducing metric for uncovering vulnerabilities in deep convolutional neural networks;Knowledge-Based Systems;2024-10
3. Enhancing anomaly detection: A comprehensive approach with MTBO feature selection and TVETBO Optimized Quad-LSTM classification;Computers and Electrical Engineering;2024-10
4. Transfer Learning Approach for Detecting Keylogging Attack on the Internet of Things;2024 4th International Conference on Emerging Smart Technologies and Applications (eSmarTA);2024-08-06
5. Advancing Fault Detection Efficiency in Wireless Power Transmission with Light GBM for Real-Time Detection Enhancement;International Research Journal of Multidisciplinary Technovation;2024-07-18
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3