2021
DOI: 10.1007/s10207-021-00571-6
|View full text |Cite
|
Sign up to set email alerts
|

Anomalous behavior detection-based approach for authenticating smart home system users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…By default, this is called binary logistic regression. Another type of logistic regression is multinomial logistic regression, which is used for solving the problems of multi-class classification [28]. However, multinomial logistic regression is an extension of traditional logistic regression [26], but this method can handle more than two feasible discrete outcomes.…”
Section: ) Logistic Regressionmentioning
confidence: 99%
“…By default, this is called binary logistic regression. Another type of logistic regression is multinomial logistic regression, which is used for solving the problems of multi-class classification [28]. However, multinomial logistic regression is an extension of traditional logistic regression [26], but this method can handle more than two feasible discrete outcomes.…”
Section: ) Logistic Regressionmentioning
confidence: 99%
“…In the first case, Naïve Bayes had the lowest success rate, while in the second case, they achieved the highest prediction rates using Decision Tree and Random Forest. Amroui and Zouari [10] have proposed an architecture called Duenna to detect user behaviors that exhibit different behaviors, taking into account the use of devices within smart home systems by regular users. In this way, they have helped increase security against malicious individuals who threaten smart-home users and want to hijack the systems.…”
Section: Introductionmentioning
confidence: 99%
“…Every device operates in a specific pattern. If a user tries to operate any device differently, that results in a change in the normal behavior of that device, and the modified behavior is considered as malicious [6]. In such situations, the current behavior is matched with the historical behavior of the specific device to verify the mode of behavior (whether safe or unsafe).…”
Section: Introductionmentioning
confidence: 99%