1.
Nagisetty, A. and G.P. Gupta. Framework for detection of malicious activities in IoT networks using keras deep learning library. in 2019 3rd international conference on computing methodologies and communication (ICCMC). 2019. IEEE.
2.
Malik, M. and M. Dutta, Security Challenges in Internet of Things (IoT) Integrated Power and Energy (PaE) Systems. Intelligent Data Analytics for Power and Energy Systems, 2022: p. 555-566.
3.
Ho, E.S., Data Security Challenges in Deep Neural Network for Healthcare IoT Systems, in Security and Privacy Preserving for IoT and 5G Networks. 2022, Springer. p. 19-37.
4.
Nawir, M., et al. Internet of Things (IoT): Taxonomy of security attacks. in 2016 3rd international conference on electronic design (ICED). 2016. IEEE.
5.
Chen, K., et al., Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice. Journal of Hardware and Systems Security, 2018. 2(2): p. 97-110.
6.
Saharkhizan, M., et al., An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet of Things Journal, 2020. 7(9): p. 8852-8859.
7.
Radivilova, T., et al. Classification methods of machine learning to detect DDoS attacks. in 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). 2019. IEEE.
8.
Sanmorino, A. A study for DDOS attack classification method. in Journal of Physics: Conference Series. 2019. IOP Publishing.
9.
Parmisano, A., S. Garcia, and M. Erquiaga, Aposemat IoT-23: A labeled dataset with malicious and benign IoT network traffic. Accessed: Jul, 2020. 31: p. 2020.
10.
Giusto, D., et al., The internet of things: 20th Tyrrhenian workshop on digital communications. 2010: Springer Science & Business Media.
11.
Kareem, M.I. and M.N. Jasim, Fast and accurate classifying model for denial-of-service attacks by using machine learning. Bulletin of Electrical Engineering and Informatics, 2022. 11(3): p. 1742-1751.
12.
Kumari, K. and M. Mrunalini, Detecting Denial of Service attacks using machine learning algorithms. Journal of Big Data, 2022. 9(1): p. 1-17.
13.
Li, Z., A.L.G. Rios, and L. Trajkovi?. Classifying Denial of Service Attacks Using Fast Machine Learning Algorithms. in 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC). 2021. IEEE.
14.
Tabassum, A., et al., FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning. Computer Communications, 2022. 192: p. 299-310.
15.
Tabassum, A., et al., Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems. IEEE Access, 2021. 9: p. 14271-14283.
16.
PICON RUIZ, A., et al., Why deep learning performs better than classical machine learning? Dyna Ingenieria E Industria, 2020.
17.
Sewak, M., S.K. Sahay, and H. Rathore. Comparison of deep learning and the classical machine learning algorithm for the malware detection. in 2018 19th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). 2018. IEEE.
18.
Soe, Y.N., et al. A sequential scheme for detecting cyber attacks in IoT environment. in 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). 2019. IEEE.
19.
Hanif, S., T. Ilyas, and M. Zeeshan. Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset. in 2019 IEEE 16th international conference on smart cities: improving quality of life using ICT & IoT and AI (HONET-ICT). 2019. IEEE.
20.
Fatayer, T.S. and M.N. Azara. IoT secure communication using ANN classification algorithms. in 2019 International Conference on Promising Electronic Technologies (ICPET). 2019. IEEE.
21.
Gopi, R., et al., Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multimedia Tools and Applications, 2021: p. 1-19.
22.
Churcher, A., et al., An experimental analysis of attack classification using machine learning in IoT networks. Sensors, 2021. 21(2): p. 446.
23.
Mehmood, A., A.N. Khan, and M. Elhadef, HeuCrip: a malware detection approach for internet of battlefield things. Cluster Computing, 2022: p. 1-16.
24.
Li, W., et al., A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Journal of Electrical and Computer Engineering, 2014. 2014.
25.
Iman, A.I.N., LOW RATE DDOS ATTACK DETECTION USING KNN ON SD-IOT. 2022, Universitas Muhammadiyah Malang.
26.
Alfarshouti, A.M. and S.M. Almutairi, An Intrusion Detection System in IoT Environment Using KNN and SVM Classifiers. Webology, 2022. 19(1).
27.
27. Islam, U., et al., Detection of Distributed Denial of Service (DDoS) Attacks in IOT Based Monitoring System of Banking Sector Using Machine Learning Models. Sustainability, 2022. 14(14): p. 8374.
28.
Aslam, M., et al., Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT. Sensors, 2022. 22(7): p. 2697.
29.
majeed Alhammadi, N.A., Comparative study between (SVM) and (KNN) classifiers by using (PCA) to improve of intrusion detection system. Iraqi Journal of Intelligent Computing and Informatics (IJICI), 2022. 1(1): p. 22-33.
30.
Garcia, S., A. Parmisano, and M.J. Erquiaga, IoT-23: A labeled dataset with malicious and benign IoT network traffic. Stratosphere Lab., Praha, Czech Republic, Tech. Rep, 2020.
31.
Lee, S.-J. and X. Zeng. A modular method for estimating null values in relational database systems. in 2008 Eighth International Conference on Intelligent Systems Design and Applications. 2008. IEEE.
32.
Abdulla, S.M., N.B. Al-Dabagh, and O. Zakaria, Identify features and parameters to devise an accurate intrusion detection system using artificial neural network. International Journal of Computer and Information Engineering, 2010. 4(10): p. 1553-1557.
33.
Weller-Fahy, D.J., B.J. Borghetti, and A.A. Sodemann, A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Communications Surveys & Tutorials, 2014. 17(1): p. 70-91.
34.
Bhandari, A. Everything you Should Know about Confusion Matrix for Machine Learning. April 17, 2020 June 14th, 2022 August 26, 2022]; Available from: https://www.analyticsvidhya.com/blog/2020/04/confusion-matrix-machine-learning/#:~:text=A%20Confusion%20matrix%20is%20an,by%20the%20machine%20learning%20model.