Decision tree based data pruning with the estimation of oversampling attributes for the secure communication in IOT

N Mohamed, A Awasthi, N Kulkarni, S Thota… - International Journal of …, 2022 - ijisae.org
Abstract Internet of Things (IoT) exhibits a significant role to evaluate the error or supply
shortage. The IoT demand for the security and authentication of the devices is considered as …

Fusion of IoT and machine learning approach to prevent confidential data from digital crimes and cyber mugging for covert transmission

AK Shakya, A Ramola, HS Pokhariya… - Applications of Computing …, 2019 - Springer
We are aware of the scenario of the twenty-first century where each and every nation of the
world wants to progress at a rapid rate, weaker nations are destabilized by adopting policies …

[PDF][PDF] Improving IoT security using lightweight based deep learning protection model

MS Mahmood, NB Al Dabagh - Tikrit Journal of Engineering Sciences, 2023 - iasj.net
The Internet of Things (IoT) has recently become an essential ingredient of human life. The
main critical challenges that confront IoT are security and protection. Several methods have …

[HTML][HTML] Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks

L Xu, H Yin, H Jia, W Lin, X Zhou, Y Fu, X Yu - Digital Communications and …, 2023 - Elsevier
Abstract Mobile Industrial Internet of Things (IIoT) applications have achieved the explosive
growth in recent years. The mobile IIoT has flourished and become the backbone of the …

[HTML][HTML] Security and privacy techniques in IoT environment

JCW Lin, KH Yeh - Sensors, 2020 - mdpi.com
Due to rapid technical advancements, many devices in the Internet of Things (IoT)
environment, such as embedded systems, mobile devices, actuators, and sensors (all of …

Harris hawks feature selection in distributed machine learning for secure iot environments

N Hijazi, M Aloqaily, B Ouni, F Karray… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
The development of the Internet of Things (IoT) has dramatically expanded our daily lives,
playing a pivotal role in the enablement of smart cities, healthcare, and buildings. Emerging …

Deep neural network-based clustering technique for secure IIoT

A Mukherjee, P Goswami, L Yang… - Neural Computing and …, 2020 - Springer
Abstract The advent of Industrial Internet of Things (IIoT) has determined the proliferation of
smart devices connected to the Internet and injected a vast amount of data into it, which may …

Industrial Internet of Things Anti‐Intrusion Detection System by Neural Network in the Context of Internet of Things for Privacy Law Security Protection

D Teng - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
Today, the Industrial Internet of Things (IIoT) and network technology are highly developed,
and network data breaches occur every year. Therefore, an anti‐intrusion detection system …

Decision Tree with Pearson Correlation-based Recursive Feature Elimination Model for Attack Detection in IoT Environment

A Padmashree, M Krishnamoorthi - Information Technology and Control, 2022 - itc.ktu.lt
The industrial revolution in recent years made massive uses of Internet of Things (IoT)
applications like smart cities' growth. This leads to automation in real-time applications to …

Machine learning benchmarking for secured iot smart systems

MS Abdalzaher, MM Salim, HA Elsayed… - … on Internet of Things …, 2022 - ieeexplore.ieee.org
Smartness and IoT along with machine learning (ML) lead the research directions
nowadays. Smart city, smart campus, smart home, smart vehicle, etc; or if we call it “Smart x” …