Open Access
Issue |
BIO Web Conf.
Volume 97, 2024
Fifth International Scientific Conference of Alkafeel University (ISCKU 2024)
|
|
---|---|---|
Article Number | 00164 | |
Number of page(s) | 9 | |
DOI | https://doi.org/10.1051/bioconf/20249700164 | |
Published online | 05 April 2024 |
- M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, and M. Guizani, “A survey of machine and deep learning methods for internet of things (IoT) security,” IEEE Commun. Surv. Tutorials, vol. 22, no. 3, pp. 1646–1685, 2020. [CrossRef] [Google Scholar]
- H. He et al., “The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence,” in 2016 IEEE congress on evolutionary computation (CEC), 2016, pp. 1015–1021. [CrossRef] [Google Scholar]
- M. S. Harsha, B. M. Bhavani, and K. R. Kundhavai, “Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs,” in 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018, pp. 2244–2250. [CrossRef] [Google Scholar]
- D. Evans, “The internet of things,” How Next Evol. Internet is Chang. Everything, Whitepaper, Cisco Internet Bus. Solut. Gr., vol. 1, pp. 1–12, 2011. [Google Scholar]
- “IoT devices installed base worldwide 2015-2025 | Statista.” https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/ (accessed on 19 March 2024). [Google Scholar]
- “Cyber Security Report 2023 | Check Point Software.” https://pages.checkpoint.com/cyber-security-report-2023.html (accessed on 19 March 2024). [Google Scholar]
- S. Mirjalili, A. H. Gandomi, S. Z. Mirjalili, S. Saremi, H. Faris, and S. M. Mirjalili, “Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems,” Adv. Eng. Softw., vol. 114, pp. 163–191, 2017. [CrossRef] [Google Scholar]
- J. Zhang and J.-S. Wang, “Improved salp swarm algorithm based on levy flight and sine cosine operator,” Ieee Access, vol. 8, pp. 99740–99771, 2020. [CrossRef] [Google Scholar]
- L. Abualigah, M. Shehab, M. Alshinwan, and H. Alabool, “Salp swarm algorithm: a comprehensive survey,” Neural Comput. Appl., vol. 32, pp. 11195–11215, 2020. [CrossRef] [Google Scholar]
- A. Özgür and H. Erdem, “A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015,” 2016. [Google Scholar]
- H. Moradi Koupaie, S. Ibrahim, and J. Hosseinkhani, “Outlier detection in stream data by machine learning and feature selection methods,” Int. J. Adv. Comput. Sci. Inf. Technol. Vol, vol. 2, pp. 17–24, 2014. [Google Scholar]
- A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Commun. Surv. tutorials, vol. 18, no. 2, pp. 1153–1176, 2015. [Google Scholar]
- M. A. Umar and C. Zhanfang, “Effects of Feature Selection and Normalization on Network Intrusion Detection,” Authorea Prepr., 2023. [Google Scholar]
- H. Tchakoute-Tchuigoua and I. Soumaré, “The effect of loan approval decentralization on microfinance institutions’ outreach and loan portfolio quality,” J. Bus. Res., vol. 94, pp. 1–17, 2019. [CrossRef] [Google Scholar]
- T. Hastie, R. Tibshirani, J. H. Friedman, and J. H. Friedman, The elements of statistical learning: data mining, inference, and prediction, vol. 2. Springer, 2009. [Google Scholar]
- H. Hindy, E. Bayne, M. Bures, R. Atkinson, C. Tachtatzis, and X. Bellekens, “Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT- IDS2020 dataset),” in International networking conference, 2020, pp. 73–84. [Google Scholar]
- H. Hindy, C. Tachtatzis, R. Atkinson, E. Bayne, and X. Bellekens, “Mqtt internet of things intrusion detection dataset.” Jun, 2020. [Google Scholar]
- M. Buckland and F. Gey, “The relationship between recall and precision,” J. Am. Soc. Inf. Sci., vol. 45, no. 1, pp. 12–19, 1994. [CrossRef] [Google Scholar]
- D. Chicco and G. Jurman, “The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation,” BMC Genomics, vol. 21, pp. 1–13, 2020. [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.