2018
DOI: 10.1109/cc.2018.8300282
|View full text |Cite
|
Sign up to set email alerts
|

A cloud-assisted malware detection and suppression framework for wireless multimedia system in IoT based on dynamic differential game

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…Support Vector Machines (SVM) SVM is a supervised ML algorithm with low computational complexity, used for classification and regression. It has the ability to work with binary as well as with multi-class environments [78], [79]. It classifies input data into n dimensional space and draws n − 1 hyperplane to divide the entire data points into groups.…”
Section: K-means Algorithmmentioning
confidence: 99%
“…Support Vector Machines (SVM) SVM is a supervised ML algorithm with low computational complexity, used for classification and regression. It has the ability to work with binary as well as with multi-class environments [78], [79]. It classifies input data into n dimensional space and draws n − 1 hyperplane to divide the entire data points into groups.…”
Section: K-means Algorithmmentioning
confidence: 99%
“…For the detection of WMS malware, obtaining its network behaviors is critical. The malware detection scheme of Zhou et al [79] facilitated the collection of network behaviors in WMS using the data sniffer (DroidSniffer), combined with SVM, BP neural networks to detect malware and suppress malicious codes. In the experiment, the highest infection rate was only 22.17%, which proved that malware can be detected at a lower infection rate.…”
Section: ) Network Behaviorsmentioning
confidence: 99%
“…[26] and [27] have also published some recent works on Deep Reinforcement Learning (DRL). There are varieties of machine learning algorithms used in IoT which includes: NaiveBayes [28], K-Nearest neighbor [29], k-means algorithm [30], Random Forest and Decision Tree [31], Support Vector Machine (SVM) [32], [33], Recurrent Neural Networks (RNN) [34]- [36], Principal Component Analysis [37], Q-learning [30] and Deep Learning [38]. These algorithms can be used in addressing some research problems like authentication, attack detection and mitigation, distributed DoS attack, Anomaly/Intrusion Detection and malware analysis.…”
Section: Literature Reviewmentioning
confidence: 99%