2023
DOI: 10.1016/j.dcan.2022.09.021
|View full text |Cite
|
Sign up to set email alerts
|

Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…In addition, for leaves with irregular and complicated shapes, e.g., those of Fatsia japonica and conifer needles, it is not convenient to choose suitable geometric prisms enclosing the leaf blade. Nevertheless, with the advancement of computer hardware ( Lin et al., 2022b ) with superior graphics processing capabilities and artificial intelligence algorithms that can support forest survey applications, we believe that accurate tree feature recognition and plant phenotyping research ( Li et al., 2022 ) at fine scales will become easier and more accurate in the future, which will propel the development of precision forestry ( Holopainen et al., 2014 ) that incorporates interpretations of the volume-based GF vol of trees.…”
Section: Discussionmentioning
confidence: 99%
“…In addition, for leaves with irregular and complicated shapes, e.g., those of Fatsia japonica and conifer needles, it is not convenient to choose suitable geometric prisms enclosing the leaf blade. Nevertheless, with the advancement of computer hardware ( Lin et al., 2022b ) with superior graphics processing capabilities and artificial intelligence algorithms that can support forest survey applications, we believe that accurate tree feature recognition and plant phenotyping research ( Li et al., 2022 ) at fine scales will become easier and more accurate in the future, which will propel the development of precision forestry ( Holopainen et al., 2014 ) that incorporates interpretations of the volume-based GF vol of trees.…”
Section: Discussionmentioning
confidence: 99%
“…This method can reduce redundant information in the dataset, improve the performance of IDS, and reduce its processing time. Lin et al [27] designed a multi feature extraction ELM (MFE-ELM) algorithm for cloud computing, added a multi feature extraction process to cloud servers, and used the MFE-ELM algorithm deployed on cloud nodes to detect and discover network intrusion on cloud nodes. The proposed algorithm can effectively detect and recognize most network data packets with good model performance.…”
Section: Related Workmentioning
confidence: 99%
“…They evaluated their model on NSL-KDD, UNSW-NB15, and CIC-IDS 2017. To prevent intrusion in a cloud-based IoT environment, Lin et al [41] developed an IDS using multi-feature extraction Extreme Learning Machine (MELM) to detect attacks on the NSL-KDD dataset. Yousefnezhad et al [42] increased the detection rate and reduced the false alarm rate by proposing an ensemble classification model using Dempster-Shafer technique (DM) to detect assaults in the network traffic.…”
Section: Comparative Analysismentioning
confidence: 99%