2022
DOI: 10.1007/s13721-022-00390-2
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning-based intrusion detection for SCADA systems in healthcare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…With a sub-eld called Deep Learning, deep structured networks can produce outstanding results by performing feature extraction on large and complex datasets. Used in many elds such as natural language processing, and game strategies, ANNs play an important role in processing large amounts of data and understanding complex relationships [40].…”
Section: Arti Cial Neural Networkmentioning
confidence: 99%
“…With a sub-eld called Deep Learning, deep structured networks can produce outstanding results by performing feature extraction on large and complex datasets. Used in many elds such as natural language processing, and game strategies, ANNs play an important role in processing large amounts of data and understanding complex relationships [40].…”
Section: Arti Cial Neural Networkmentioning
confidence: 99%
“…In addition to the selection of multiple sub-models, STCK allows you to specify an additional model to learn how to best combine the predictions of the sub-models. Because a metamodel is used to best combine the predictions of the sub-models, this method is sometimes referred to as mixture, as is mixture of predictions [32]. The STCK process is illustrated in Figure 10.…”
Section: Stackingmentioning
confidence: 99%
“…There are 41 characteristics in total, 38 of which are numeric, and 3 of which are not (protocol type, service type, and fag). There are also fundamental traffic features (23)(24)(25)(26)(27)(28)(29)(30)(31)(32)(33)(34)(35)(36)(37)(38)(39)(40)(41), content features (11)(12)(13)(14)(15)(16)(17)(18)(19)(20)(21)(22), features (1-10), and a class label for each item.…”
Section: Dataset Descriptionmentioning
confidence: 99%
“…Several researchers have suggested using AI in the smart healthcare system as a reliable and practical security solution [14]. Many of the relevant studies in the literature have developed computerized simulations for network intrusion recognition using machine learning techniques, such as K-nearest neighbor (KNN) [15], Naïve Bayes [16], Support Vector Machine (SVM) [17], Random Forest (RF) [18], etc.…”
Section: Introductionmentioning
confidence: 99%