The proliferation of the Internet of Things (IoT) is occurring swiftly and is all-encompassing. The cyber attack on Dyn in 2016 brought to light the notable susceptibilities of intelligent …
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …
Modern datasets in intrusion detection are designed to be evaluated by machine learning techniques and often contain metadata features which ought to be removed prior to training …
LF Khalid, AM Abdulazeez… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Nowadays, many businesses and organizations have begun to collect data on their future and current customers to evaluate churning rate and prevent the loss of potential customers …
A John, IFB Isnin… - IET Wireless Sensor …, 2024 - Wiley Online Library
Wireless sensor network (WSN) cluster‐based architecture is a system designed to control and monitor specific events or phenomena remotely, and one of the important concerns that …
M Khan, M Haroon - SN Computer Science, 2023 - Springer
The use of the Internet is enhanced drastically in the current era, which connects multiple computers in a network and a group of devices. In addition, every sector uses the Internet to …
Z Zhong, C Xie, X Tang - IEEE Access, 2024 - ieeexplore.ieee.org
To solve the problem that the existing intrusion traffic detection models generally adopt machine learning algorithm and supervised deep learning algorithm, and the classification …
Web of thing (WoT) is a gifted answer for interface and access each gadget through the web. Consistently the gadget includes increments with huge variety fit as a fiddle, size, use and …
Z Amin, A Kabir - 2022 IEEE/ACIS 7th International Conference …, 2022 - ieeexplore.ieee.org
The cyber assault has emerged as a serious digital threat. Day after day, hackers inflict severe financial harm on nations and people alike. As a result, threat detection has become …