Accepted: 12 June 2019 The Internet of Things (IoT) is vulnerable to various attacks, due to the presence of tiny computing devices. To enhance the security of the IoT, this paper builds …
T Sherasiya, H Upadhyay, HB Patel - International Journal of …, 2016 - academia.edu
ABSTRACT The Internet of Things (IoT) is an ever-growing network of smart objects. It refers to the physical objects are capable of exchanging information with other physical objects. It …
T Sherasiya, H Upadhyay - Int. J. Adv. Res. Innov. Ideas Educ.(IJARIIE), 2016 - Citeseer
ABSTRACT The Internet of Things (IoT) is an ever-growing network of smart objects. It refers to the physical objects are capable of exchanging information with other physical objects. It …
The main problem facing the Internet of Things (IoT) today is the identification of attacks due to the constrained nature of IoT devices. To address this problem, we present a lightweight …
The usage of the most popular neural network–Multilayer perceptron, as gained ground for the purpose of detecting intrusion. A lot of researchers had used it judiciously but there exist …
MO Odim, SO Ojo, B Oyenike - behaviour, 2023 - academia.edu
Computer network Intrusion is an unauthorised action or activity on a network. The threat of intrusions on cyber-security has grown significantly recently. Various techniques are used to …
В настоящее время наблюдается тренд на повсеместные компьютерные вычисления и автоматическую обработку данных в сети. В связи с этим, проведено огромное …
MM Elgindy, SM Elghamrawy… - Mansoura …, 2023 - mej.researchcommons.org
Intrusion detection systems IDS are increasingly utilizing machine learning methods. IDSs are important tools for ensuring the security of network data and resources. The Internet of …
Accepted: 17 September 2020 The main problem facing the Internet of Things (IoT) today is the identification of attacks due to the constrained nature of IoT devices. To address this …