2019 IEEE 10th Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2019
DOI: 10.1109/uemcon47517.2019.8992963
|View full text |Cite
|
Sign up to set email alerts
|

FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(22 citation statements)
references
References 25 publications
0
22
0
Order By: Relevance
“… Alrashdi et al (2019) presented a fog-based attack detection (FBAD) architecture by utilizing an online sequential extreme learning machine (EOS-ELM) collection for monitoring of suspicious behaviors in healthcare system. They proved that the proposed architecture is effectively implemented in the decentralized fog-attack detection by comparing its efficiency to other methods.…”
Section: Results and Findingsmentioning
confidence: 99%
“… Alrashdi et al (2019) presented a fog-based attack detection (FBAD) architecture by utilizing an online sequential extreme learning machine (EOS-ELM) collection for monitoring of suspicious behaviors in healthcare system. They proved that the proposed architecture is effectively implemented in the decentralized fog-attack detection by comparing its efficiency to other methods.…”
Section: Results and Findingsmentioning
confidence: 99%
“…Likewise, Carta et al [ 20 ] introduced a feature engineering technique to efficiently detect the anomalies in order to improve the performance of traditional IDSs. Similarly, Alrashdi et al [ 25 ] proposed a framework for detecting the malicious in fog-based IoT healthcare system. The authors used an ensemble of online sequential ELM to detect malicious attacks like man-in-the-middle, DDoS, etc.…”
Section: Literature Reviewmentioning
confidence: 99%
“…are familiar node-based attack. Alrashdi et al [131] examined fog-based attacks like jamming, DDoS, Sybil, etc. on proposed IoT healthcare architecture that adversely inhibits fog node operation.…”
Section: Processing Layer Threatsmentioning
confidence: 99%