2021
DOI: 10.1016/j.micpro.2020.103814
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED: Detection of attacks in IoT sensors networks using machine learning algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(8 citation statements)
references
References 7 publications
1
7
0
Order By: Relevance
“…It was demonstrated that RF outperforms other technologies. This conclusion was comparable to that of Bedi et al [25], who investigated irregularities on an IoT network by comparing ANN, LR, RF, SVM, and DT. They also found RF performed better than the others.…”
Section: Relevant Studiessupporting
confidence: 88%
“…It was demonstrated that RF outperforms other technologies. This conclusion was comparable to that of Bedi et al [25], who investigated irregularities on an IoT network by comparing ANN, LR, RF, SVM, and DT. They also found RF performed better than the others.…”
Section: Relevant Studiessupporting
confidence: 88%
“…In addition, spyware like Skeeyah and worms like Omni and Themoon also perform industrial Spying in IoT areas. Spying, along with different attacks like data type probing, is detected in [ 45 ], using a three-stage machine learning-based detection model. Stage one includes the dataset preparation and assortment.…”
Section: Iot Malware Categories and Familiesmentioning
confidence: 99%
“…Spying, along with different attacks like data type probing, is detected in [ 45 ], using a three-stage machine learning-based detection model. Stage one includes the dataset preparation and assortment.…”
Section: Iot Malware Categories and Familiesmentioning
confidence: 99%
See 2 more Smart Citations