… we also propose an intrusion detection framework for 5G and IoTnetworks which is based on multiple kernel k-means with incomplete kernels. The experimental results show that our …
D Li, Z Zhang, W Liao, Z Xu - 2018 IEEE/ACM Symposium on …, 2018 - ieeexplore.ieee.org
… other network attack methods are easy to capture the resource constrained … a kernellevel rresource auditing tool for IoT operatingsystem security. This tool can achieve real-time kernel …
… IoT’s requirement for kernel design … -level servers as a memory, file, and time server. This gives the advantage that the whole system does not crash if one server fails. At the kernellevel, …
BS Dhak, PL Ramteke - International Conference on Communication …, 2021 - Springer
… kernel-level implementations are available for IoTnetworks; thus, it becomes difficult for IoT … of protocols to be used at the kernellevel for optimum security and QoS performance. In …
J Lee, T Kim, W Cho, H Lee - 2015 17th International …, 2015 - ieeexplore.ieee.org
… and insufficient information for self-adaptive networks. For these reasons, we develop a lightweight built-in network monitor running at Linux kernellevel for self-adaptive IoT devices. …
… level access can be a powerful way to detect anomalous behavior [3]. We hypothesize that, as IoT devices have a simple and unique purpose, low-level … Indeed, most state-of-the-art IoT …
CU Om Kumar, S Marappan, B Murugeshan… - Wireless Personal …, 2023 - Springer
… network (Deep Multi-scale Convolution Neural Network). In this paper, several balanced convolution kernels extracted different feature levels … The learning level of the network structure …
P Gaur, MP Tahiliani - 2015 IEEE region 10 symposium, 2015 - ieeexplore.ieee.org
… Conventional TCP/IP stacks and WSN networking technologies are not suitable for IoT. While former fails to … In IoT devices, where simple and small kernel is a primary goal, many …
… suitable for IoT with the current status and networking stack. Finally, open research issues in … to access the lower-level hardware by locating the operating system’s kernel. A significant …