2021
DOI: 10.1016/j.matpr.2021.01.207
|View full text |Cite|
|
Sign up to set email alerts
|

WITHDRAWN: A deep-RNN and meta-heuristic feature selection approach for IoT malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…The proposed MPGA‐DCKCNN techniques obtain higher classification performance when compared to the other techniques as shown in Table 9 due to its ability to accurately discriminate between the attack and normal classes. The performance of the deep RNN and metaheuristic feature selection 33 and KVM inspector 34 is also very high when compared to the other techniques. Every classifier offers an above satisfactory performance but they are not efficient when identifying a unique attack.…”
Section: Experimental Analysis and Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The proposed MPGA‐DCKCNN techniques obtain higher classification performance when compared to the other techniques as shown in Table 9 due to its ability to accurately discriminate between the attack and normal classes. The performance of the deep RNN and metaheuristic feature selection 33 and KVM inspector 34 is also very high when compared to the other techniques. Every classifier offers an above satisfactory performance but they are not efficient when identifying a unique attack.…”
Section: Experimental Analysis and Resultsmentioning
confidence: 99%
“…In the comparative analysis section, the proposed methodology is compared with state‐of‐art techniques such as VMGuard, 9 RNN, 32 deep RNN and metaheuristic feature selection, 33 and KVM inspector 34 . These techniques also include cloud‐based IDSs that take account of the statistical meta‐features.…”
Section: Experimental Analysis and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Radhakrishnan et al 44 proposed a LSTM technique to detect IoT malware. First and foremost, all data gathered from VirusTotal Website and their Op‐Code were extracted through a Linux bash code.…”
Section: Organization Of Iot Threat Detection Techniquesmentioning
confidence: 99%