2021
DOI: 10.1007/978-981-16-4943-1_37
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Various Machine Learning Algorithms for Detection of Attacks in 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Using the information that was received from the logs, Arul Stephen et. al [6] analysed the functionality of the IoT Network. Several methods for supervised machine learning have been utilised throughout the course of the inquiry.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Using the information that was received from the logs, Arul Stephen et. al [6] analysed the functionality of the IoT Network. Several methods for supervised machine learning have been utilised throughout the course of the inquiry.…”
Section: Related Workmentioning
confidence: 99%
“…The Open-Source IoT Device Network Logs dataset was collected from the Kaggle [6]. In this Dataset there are 477426 data, 13 input features, and one output label class called normality.…”
Section: Dataset Collection and Descriptionmentioning
confidence: 99%