2017 8th International Conference on Information, Intelligence, Systems &Amp; Applications (IISA) 2017
DOI: 10.1109/iisa.2017.8316459
|View full text |Cite
|
Sign up to set email alerts
|

A brief survey of machine learning methods and their sensor and IoT applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
95
0
6

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 213 publications
(101 citation statements)
references
References 117 publications
0
95
0
6
Order By: Relevance
“…The deployment of IoT on massive scale also brings challenges. Some of these challenges include design of networking and storage architecture for smart devices, efficient data communication protocols, proactive identification and protection of IoT from malicious attacks, standardization of technologies, and devices and application interfaces [19], [20] etc. Inter-connectivity: IoT devices are expected to be connected to global information and communication infrastructure and can be accessed from anywhere and anytime.…”
Section: A Characteristics Of Iot Networkmentioning
confidence: 99%
“…The deployment of IoT on massive scale also brings challenges. Some of these challenges include design of networking and storage architecture for smart devices, efficient data communication protocols, proactive identification and protection of IoT from malicious attacks, standardization of technologies, and devices and application interfaces [19], [20] etc. Inter-connectivity: IoT devices are expected to be connected to global information and communication infrastructure and can be accessed from anywhere and anytime.…”
Section: A Characteristics Of Iot Networkmentioning
confidence: 99%
“…Recently, several research efforts 30,[36][37][38][39] have started to apply machine learning techniques to detect malicious traffic data and behaviors of devices running in IoT environments. Consequently, we need efficient security controls that can be automated and quickly analyse and differentiate between benign and malicious IoT data.…”
Section: Machine Learning: An Opportunity For Improving Iot Securitymentioning
confidence: 99%
“…Consequently, we need efficient security controls that can be automated and quickly analyse and differentiate between benign and malicious IoT data. Recently, several research efforts 30,[36][37][38][39] have started to apply machine learning techniques to detect malicious traffic data and behaviors of devices running in IoT environments. Several drivers are responsible for this surge in interest in machine learning techniques aimed at improving IoT security.…”
Section: Machine Learning: An Opportunity For Improving Iot Securitymentioning
confidence: 99%
“…We used a support-vector machine (SVM) for C-support vector classification. SVMs are linear classifiers that attempt to construct a maximum-margin hyperplane to optimally separate data into two categories to provide the best generalization capacity, and are suitable for binary classification problems such as ours [30]. We used the minutes online and elapse seconds as two features for this model (Figure 6a).…”
Section: Experiment: Proactive Ftmentioning
confidence: 99%