Skip to main content
Erschienen in: The Journal of Supercomputing 6/2022

14.01.2022

RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures

verfasst von: Eid Rehman, Muhammad Haseeb-ud-Din, Arif Jamal Malik, Tehmina Karmat Khan, Aaqif Afzaal Abbasi, Seifedine Kadry, Muhammad Attique Khan, Seungmin Rho

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Globally, data security and privacy over the Internet of Things (IoT) are necessary due to its emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT security is significant. The nature of attacks is dynamic, and addressing this requires designing dynamic methods and a self-adaptable scheme to discover security attacks from malicious use of IoT equipment. The best detection mechanism against attacks from compromised IoT devices includes machine learning techniques. This study emphasizes the latest literature on attack types and uses a scheme based on machine learning for network support in IoT and intrusion detection. Therefore, the current work includes a thorough analysis of multiple intelligence methods and their deployed architectures of network intrusion detection, focusing on IoT attacks and machine learning-based intrusion detection schemes. Moreover, it explores methods based on machine learning appropriate for identifying IoT devices associated with cyber attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sundmaeker H, Guillemin P, Friess P, Woelfflé S (2010) Vision and challenges for realising the internet of things. Cluster Eur Res Projects Internet Things Eur Commision 3:34–36 Sundmaeker H, Guillemin P, Friess P, Woelfflé S (2010) Vision and challenges for realising the internet of things. Cluster Eur Res Projects Internet Things Eur Commision 3:34–36
3.
Zurück zum Zitat Johannes D, Heineke K, Reinbacher T, Wee D (2018) The internet of things: how to capture the value of IoT. Technical Report pp. 1–124 Johannes D, Heineke K, Reinbacher T, Wee D (2018) The internet of things: how to capture the value of IoT. Technical Report pp. 1–124
4.
Zurück zum Zitat Mosenia A, Jha NK (2016) A comprehensive study of security of Internet-of-Things. IEEE Trans Emerg Topics Comput 5:586–602CrossRef Mosenia A, Jha NK (2016) A comprehensive study of security of Internet-of-Things. IEEE Trans Emerg Topics Comput 5:586–602CrossRef
5.
Zurück zum Zitat M Young 1989 Checklist before starting the analysis 2 In: The Technical Writer’s Handbook University Science Mill Valley: CA M Young 1989 Checklist before starting the analysis 2 In: The Technical Writer’s Handbook University Science Mill Valley: CA
6.
Zurück zum Zitat Yousuf O, Mir RN (2019) A survey on the internet of things security: State-of-art, architecture, issues and countermeasures. Inf Comput Secur 27:292–323CrossRef Yousuf O, Mir RN (2019) A survey on the internet of things security: State-of-art, architecture, issues and countermeasures. Inf Comput Secur 27:292–323CrossRef
8.
Zurück zum Zitat Yang Z, Yue Y, Yang Y, Peng Y, Xiaobo et al. (2011) Study and application on the architecture and key technologies for IoT. In: 2011 Int Conf Multimed Technol, IEEE, pp. 747–751 Yang Z, Yue Y, Yang Y, Peng Y, Xiaobo et al. (2011) Study and application on the architecture and key technologies for IoT. In: 2011 Int Conf Multimed Technol, IEEE, pp. 747–751
9.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54:2787–2805CrossRef Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54:2787–2805CrossRef
10.
Zurück zum Zitat Torkaman A, Seyyedi MA (2016) Analyzing IoT reference architecture models. Int J Comput Sci Softw Eng 5:154 Torkaman A, Seyyedi MA (2016) Analyzing IoT reference architecture models. Int J Comput Sci Softw Eng 5:154
11.
Zurück zum Zitat Chaqfeh MA, Mohamed N (2012) Challenges in middleware solutions for the Internet of Things. In: 2012 Int Conf Collaboration Technol Syst (CTS), pp. 21–26, IEEE Chaqfeh MA, Mohamed N (2012) Challenges in middleware solutions for the Internet of Things. In: 2012 Int Conf Collaboration Technol Syst (CTS), pp. 21–26, IEEE
12.
Zurück zum Zitat Moustafa N, Creech G, Sitnikova E, Keshk M (2017) Collaborative anomaly detection framework for handling big data of cloud computing. In: 2017 Military Commun Inf Syst Conf (MilCIS), pp. 1–6, IEEE Moustafa N, Creech G, Sitnikova E, Keshk M (2017) Collaborative anomaly detection framework for handling big data of cloud computing. In: 2017 Military Commun Inf Syst Conf (MilCIS), pp. 1–6, IEEE
13.
Zurück zum Zitat Moustafa N, Choo KR, Radwan I, Camtepe S (2019) Outlier dirichlet mixture mechanism: adversarial statistical learning for anomaly detection in the fog. IEEE Trans Inf Foren Secur 14:1975–1987CrossRef Moustafa N, Choo KR, Radwan I, Camtepe S (2019) Outlier dirichlet mixture mechanism: adversarial statistical learning for anomaly detection in the fog. IEEE Trans Inf Foren Secur 14:1975–1987CrossRef
16.
Zurück zum Zitat Sicari S, Rizzardi A, Grieco LA, Cen-Porisini A (2015) Security, privacy and trust in internet of things: The road ahead. Comput Netw 76:146–164CrossRef Sicari S, Rizzardi A, Grieco LA, Cen-Porisini A (2015) Security, privacy and trust in internet of things: The road ahead. Comput Netw 76:146–164CrossRef
17.
Zurück zum Zitat Asharf J, Moustafa N, Khurshid H, Debie E, Haider W, Wahab A (2020) A review of intrusion detection systems using machine and deep learning in internet of things: challenges, solutions and future directions. Electronics 9:1177CrossRef Asharf J, Moustafa N, Khurshid H, Debie E, Haider W, Wahab A (2020) A review of intrusion detection systems using machine and deep learning in internet of things: challenges, solutions and future directions. Electronics 9:1177CrossRef
22.
Zurück zum Zitat Sen S, Clark JA (2011) Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Comput Netw 55:3441–3457CrossRef Sen S, Clark JA (2011) Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Comput Netw 55:3441–3457CrossRef
23.
Zurück zum Zitat Keshk M, Moustafa N, Sitnikova E, Creech G (2017) Privacy preservation intrusion detection technique for SCADA systems. In: 2017 Military Commun Inf Syst Conf (MilCIS) IEEE pp. 1–6 Keshk M, Moustafa N, Sitnikova E, Creech G (2017) Privacy preservation intrusion detection technique for SCADA systems. In: 2017 Military Commun Inf Syst Conf (MilCIS) IEEE pp. 1–6
24.
Zurück zum Zitat Zhao K, Ge L (2013) A survey on the internet of things security. Comput Intell Secur (CIS) 10 Zhao K, Ge L (2013) A survey on the internet of things security. Comput Intell Secur (CIS) 10
25.
Zurück zum Zitat Kumar JS, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90:11 Kumar JS, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90:11
26.
Zurück zum Zitat Suo H, Wan J, Zou JC, Liu J (2012) Security in the internet of things: a review. In: Proc 2012 Int Conf Comput Sci Electron Eng Hangzhou China, 3: 648–651 Suo H, Wan J, Zou JC, Liu J (2012) Security in the internet of things: a review. In: Proc 2012 Int Conf Comput Sci Electron Eng Hangzhou China, 3: 648–651
27.
Zurück zum Zitat Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 14:199–221CrossRef Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 14:199–221CrossRef
28.
Zurück zum Zitat Zarpelão BB, Miani RS, Kawakani CT, Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25–37CrossRef Zarpelão BB, Miani RS, Kawakani CT, Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25–37CrossRef
29.
Zurück zum Zitat Da Costa KAP et al (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157CrossRef Da Costa KAP et al (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157CrossRef
30.
Zurück zum Zitat Kolias CG, Kambourakis AS, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50:80–84CrossRef Kolias CG, Kambourakis AS, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50:80–84CrossRef
31.
Zurück zum Zitat Garadi A, Mohamed MA, Al-Ali A, Du A, Guizani M (2018) A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv:1807.11023 Garadi A, Mohamed MA, Al-Ali A, Du A, Guizani M (2018) A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv:​1807.​11023
32.
Zurück zum Zitat Kolias C, Stavrou A, Voas J, Bojanova I, Kuhn R (2016) Learning Internet-of-Things security hands-on. IEEE Secur Privacy 14:37–46CrossRef Kolias C, Stavrou A, Voas J, Bojanova I, Kuhn R (2016) Learning Internet-of-Things security hands-on. IEEE Secur Privacy 14:37–46CrossRef
33.
Zurück zum Zitat Marsden T, Moustafa N, Sitnikova E, Creech G (2017) Probability risk identification-based intrusion detection system for SCADA systems. In: Int Conf Mobile Netw Manag pp. 353–363 Marsden T, Moustafa N, Sitnikova E, Creech G (2017) Probability risk identification-based intrusion detection system for SCADA systems. In: Int Conf Mobile Netw Manag pp. 353–363
35.
Zurück zum Zitat Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36:42–57CrossRef Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36:42–57CrossRef
36.
Zurück zum Zitat Rizwan R, Khan FA, Abbas H, Chauhdary SH (2015) Anomaly detection in wireless sensor networks using immune-based bioinspired mechanism. Int J Distribut Sens Netw 2015:11–10 Rizwan R, Khan FA, Abbas H, Chauhdary SH (2015) Anomaly detection in wireless sensor networks using immune-based bioinspired mechanism. Int J Distribut Sens Netw 2015:11–10
37.
Zurück zum Zitat Moustafa N, Creech G, Slay J (2018) Anomaly detection system using beta mixture models and outlier detection. Progress in Computing. Springer, Analytics and Networking, pp 125–135 Moustafa N, Creech G, Slay J (2018) Anomaly detection system using beta mixture models and outlier detection. Progress in Computing. Springer, Analytics and Networking, pp 125–135
38.
Zurück zum Zitat Butun I, Morgera SD, Sankar R (2013) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16:266–282CrossRef Butun I, Morgera SD, Sankar R (2013) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16:266–282CrossRef
39.
Zurück zum Zitat Mitchell R, Chen I (2014) A survey of intrusion detection techniques for cyber-physical systems. ACM Comput Surv (CSUR) 46:1–29CrossRef Mitchell R, Chen I (2014) A survey of intrusion detection techniques for cyber-physical systems. ACM Comput Surv (CSUR) 46:1–29CrossRef
40.
Zurück zum Zitat Mishra A, Nadkarni K, Patcha A (2004) Intrusion detection in wireless ad hoc networks. IEEE Wirel Commun 11:48–60CrossRef Mishra A, Nadkarni K, Patcha A (2004) Intrusion detection in wireless ad hoc networks. IEEE Wirel Commun 11:48–60CrossRef
42.
Zurück zum Zitat Benkhelifa E, Welsh T, Hamouda W (2018) A critical review of practices and challenges in intrusion detection systems for IoT: toward universal and resilient systems. IEEE Commun Surv Tutor 20:3496–3509CrossRef Benkhelifa E, Welsh T, Hamouda W (2018) A critical review of practices and challenges in intrusion detection systems for IoT: toward universal and resilient systems. IEEE Commun Surv Tutor 20:3496–3509CrossRef
43.
Zurück zum Zitat Abduvaliyev A, Pathan AK, Zhou J, Roman R, Wong W (2013) On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 15:1223–1237CrossRef Abduvaliyev A, Pathan AK, Zhou J, Roman R, Wong W (2013) On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 15:1223–1237CrossRef
44.
Zurück zum Zitat Anantvalee T, Wu J (2007) A survey on intrusion detection in mobile ad hoc networks. Wireless Network Security. Springer, Boston, MA, pp 159–180CrossRef Anantvalee T, Wu J (2007) A survey on intrusion detection in mobile ad hoc networks. Wireless Network Security. Springer, Boston, MA, pp 159–180CrossRef
45.
Zurück zum Zitat Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Secur Commun Netw 9:2484–2556CrossRef Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Secur Commun Netw 9:2484–2556CrossRef
46.
Zurück zum Zitat Lawal MA, Hassan SRA, SR (2020) Security analysis of network anomalies mitigation schemes in IoT networks. IEEE Access 8:43355–43374CrossRef Lawal MA, Hassan SRA, SR (2020) Security analysis of network anomalies mitigation schemes in IoT networks. IEEE Access 8:43355–43374CrossRef
47.
Zurück zum Zitat Garg S, Kaur K, Batra S, Kaddoum G, Kumar N, Boukerche A (2020) A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications. Future Generation Comput Syst 104:105–118CrossRef Garg S, Kaur K, Batra S, Kaddoum G, Kumar N, Boukerche A (2020) A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications. Future Generation Comput Syst 104:105–118CrossRef
48.
Zurück zum Zitat Garg S, Kaur K, Kumar N, Kaddoum G, Zomaya A, Ranjan R (2019) A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans Netw Service Manag 16:24–935 Garg S, Kaur K, Kumar N, Kaddoum G, Zomaya A, Ranjan R (2019) A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans Netw Service Manag 16:24–935
49.
Zurück zum Zitat Cirani S et al (2014) A scalable and self-configuring architecture for service discovery in the internet of things. IEEE Internet of Things J 1:508–521CrossRef Cirani S et al (2014) A scalable and self-configuring architecture for service discovery in the internet of things. IEEE Internet of Things J 1:508–521CrossRef
51.
Zurück zum Zitat Sethi P, Sarangi S (2017) Internet of things: architectures, protocols, and applications. J Electric Comput Eng 2017:1–25CrossRef Sethi P, Sarangi S (2017) Internet of things: architectures, protocols, and applications. J Electric Comput Eng 2017:1–25CrossRef
53.
Zurück zum Zitat Vacca J (2013) Computer and information security handbook. Morgan Kaufmann, Amsterdam Vacca J (2013) Computer and information security handbook. Morgan Kaufmann, Amsterdam
54.
Zurück zum Zitat Ning J, Xu J, Liang K, Zhang F, Chang EC (2018) Passive attacks against searchable encryption. IEEE Trans Inf Forensics Secur 14(3):789–802CrossRef Ning J, Xu J, Liang K, Zhang F, Chang EC (2018) Passive attacks against searchable encryption. IEEE Trans Inf Forensics Secur 14(3):789–802CrossRef
55.
Zurück zum Zitat Faruki P, Bharmal A, Laxmi V, Ganmoor V, Gaur MS, Conti M, Rajarajan M (2014) Android security: a survey of issues, malware penetration, and defenses. IEEE Commun Surv Tutor 17:998–1022CrossRef Faruki P, Bharmal A, Laxmi V, Ganmoor V, Gaur MS, Conti M, Rajarajan M (2014) Android security: a survey of issues, malware penetration, and defenses. IEEE Commun Surv Tutor 17:998–1022CrossRef
56.
Zurück zum Zitat Hemant N, Nihan S, Suresh, (2021) Survey on cyber attack. IRJCS Int Res J Comput Sci 8(4):97–101 Hemant N, Nihan S, Suresh, (2021) Survey on cyber attack. IRJCS Int Res J Comput Sci 8(4):97–101
57.
Zurück zum Zitat Lounis K, Zulkernine M (2020) Attacks and defenses in short-range wireless technologies for IoT. IEEE Access 8:88892–88932CrossRef Lounis K, Zulkernine M (2020) Attacks and defenses in short-range wireless technologies for IoT. IEEE Access 8:88892–88932CrossRef
59.
Zurück zum Zitat Rajan A, Jithish J, Sankaran S (2017) Sybil attack in IoT: modelling and defenses. In: 2017 Int Conf Adv Comput, Commun Informatics (ICACCI) pp. 2323–2327 Rajan A, Jithish J, Sankaran S (2017) Sybil attack in IoT: modelling and defenses. In: 2017 Int Conf Adv Comput, Commun Informatics (ICACCI) pp. 2323–2327
60.
Zurück zum Zitat Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 18:459–473 Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 18:459–473
61.
Zurück zum Zitat Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surv Tutor 22:1646–1685CrossRef Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surv Tutor 22:1646–1685CrossRef
64.
Zurück zum Zitat Sun L, Wang X, Wang J, Liu M, Xia G (2020) RELAP5 foresight thermal-hydraulic analysis of hypothesis passive safety injection system under LOCA for an existing NPP in China. Sci Technol Nuclear Install 2020:1–14CrossRef Sun L, Wang X, Wang J, Liu M, Xia G (2020) RELAP5 foresight thermal-hydraulic analysis of hypothesis passive safety injection system under LOCA for an existing NPP in China. Sci Technol Nuclear Install 2020:1–14CrossRef
65.
Zurück zum Zitat Heydt-Benjamin TS, Bailey DV, Fu K, Juels A, O’Hare T (2007) Vulnerabilities in first-generation RFID-enabled credit cards. In: Dietrich S, Dhamija R (eds) Financial Cryptography and Data Security. FC 2007. Lecture Notes in Computer Science, p. 4886, Springer, Berlin: Heidelberg Heydt-Benjamin TS, Bailey DV, Fu K, Juels A, O’Hare T (2007) Vulnerabilities in first-generation RFID-enabled credit cards. In: Dietrich S, Dhamija R (eds) Financial Cryptography and Data Security. FC 2007. Lecture Notes in Computer Science, p. 4886, Springer, Berlin: Heidelberg
66.
Zurück zum Zitat Amin YM, Abdel-Hamid AT (2016) A comprehensive taxonomy and analysis of IEEE 802. 15. 4 attacks. J Electr Comput Eng 2016:4 Amin YM, Abdel-Hamid AT (2016) A comprehensive taxonomy and analysis of IEEE 802. 15. 4 attacks. J Electr Comput Eng 2016:4
67.
Zurück zum Zitat Bicakci K, Tavli B (2009) Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput Stand Interfaces 31:931–941CrossRef Bicakci K, Tavli B (2009) Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput Stand Interfaces 31:931–941CrossRef
68.
Zurück zum Zitat Kumar A, Varadarajan V, Kumar A, Dadheech P, Choudhary SS, Kumar VA, Veluvolu KC (2021) Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocess Microsyst 80:103352CrossRef Kumar A, Varadarajan V, Kumar A, Dadheech P, Choudhary SS, Kumar VA, Veluvolu KC (2021) Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocess Microsyst 80:103352CrossRef
71.
Zurück zum Zitat Abdul-Ghani HA, Konstantas D, Mahyoub M (2018) A comprehensive IoT attacks survey based on a building-blocked reference model. Int J Adv Comput Sci Appl 9:355–373 Abdul-Ghani HA, Konstantas D, Mahyoub M (2018) A comprehensive IoT attacks survey based on a building-blocked reference model. Int J Adv Comput Sci Appl 9:355–373
72.
Zurück zum Zitat Hamza A, Gharakheili HH, Sivaraman V (2020) IoT network security: requirements, threats, and countermeasures. arXiv preprint arXiv:2008.09339 Hamza A, Gharakheili HH, Sivaraman V (2020) IoT network security: requirements, threats, and countermeasures. arXiv preprint arXiv:​2008.​09339
74.
Zurück zum Zitat Mitropoulos D, Spinellis D (2017) Fatal injection: A survey of modern code injection attack countermeasures. Peer J Comput Sci 3:e136 Mitropoulos D, Spinellis D (2017) Fatal injection: A survey of modern code injection attack countermeasures. Peer J Comput Sci 3:e136
75.
Zurück zum Zitat Aman MN, Sikdar B, Chua KC, Ali A (2018) Low power data integrity in IoT systems. IEEE Internet of Things J 5:3102–3113CrossRef Aman MN, Sikdar B, Chua KC, Ali A (2018) Low power data integrity in IoT systems. IEEE Internet of Things J 5:3102–3113CrossRef
76.
Zurück zum Zitat Staddon E, Loscri V, Mitton N (2021) Attack categorisation for IoT applications in critical infrastructures, a Survey. Appl Sci 11:7228CrossRef Staddon E, Loscri V, Mitton N (2021) Attack categorisation for IoT applications in critical infrastructures, a Survey. Appl Sci 11:7228CrossRef
77.
Zurück zum Zitat Liang X, Kim Y (2021) A survey on security attacks and solutions in the IoT network, 2021 IEEE 11th Ann Comput Commun Workshop Conf (CCWC), pp. 0853–0859 Liang X, Kim Y (2021) A survey on security attacks and solutions in the IoT network, 2021 IEEE 11th Ann Comput Commun Workshop Conf (CCWC), pp. 0853–0859
78.
Zurück zum Zitat Hoang TM, Duong TQ, Tuan HD, Lambotharan S, Hanzo L (2021) Physical layer security: detection of active eavesdropping attacks by support vector machines. IEEE Access 9:31595–31607CrossRef Hoang TM, Duong TQ, Tuan HD, Lambotharan S, Hanzo L (2021) Physical layer security: detection of active eavesdropping attacks by support vector machines. IEEE Access 9:31595–31607CrossRef
79.
Zurück zum Zitat Xu L, Chen J, Liu M, Wang X (2019) Active eavesdropping detection based on large-dimensional random matrix theory for massive MIMO-enabled IoT. Electronics 8:146CrossRef Xu L, Chen J, Liu M, Wang X (2019) Active eavesdropping detection based on large-dimensional random matrix theory for massive MIMO-enabled IoT. Electronics 8:146CrossRef
80.
Zurück zum Zitat Patel A, Qassim Q, Wills C (2010) A survey of intrusion detection and prevention systems. Inf Manag Comput Secur 18:277–290CrossRef Patel A, Qassim Q, Wills C (2010) A survey of intrusion detection and prevention systems. Inf Manag Comput Secur 18:277–290CrossRef
81.
Zurück zum Zitat Hanif, M. A., Akram, T., Shahzad, A., Tariq, U., Choi, J. I., & Zulfiqar, Z (2021). Smart Devices Based Multisensory Approach for Complex Human Activity Recognition. CMC 1–15. Hanif, M. A., Akram, T., Shahzad, A., Tariq, U., Choi, J. I., & Zulfiqar, Z (2021). Smart Devices Based Multisensory Approach for Complex Human Activity Recognition. CMC 1–15.
82.
Zurück zum Zitat Alladi T et al (2021) Artificial intelligence (AI)-empowered intrusion detection architecture for the internet of vehicles. IEEE Wirel Commun 28:144–149CrossRef Alladi T et al (2021) Artificial intelligence (AI)-empowered intrusion detection architecture for the internet of vehicles. IEEE Wirel Commun 28:144–149CrossRef
83.
Zurück zum Zitat Creech G, Hu J (2014) A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans Comput 63:807–819MathSciNetCrossRef Creech G, Hu J (2014) A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans Comput 63:807–819MathSciNetCrossRef
84.
Zurück zum Zitat Macia-Perez F, Mora-Gimeno FJ, Marcos-Jorquera D, Gil-Martinez-Abarca JA, Ramos-Morillo H, Lorenzo-Fonseca, (2011) Network intrusion detection system embedded on a smart sensor. IEEE Trans Ind Electron 58:722–732CrossRef Macia-Perez F, Mora-Gimeno FJ, Marcos-Jorquera D, Gil-Martinez-Abarca JA, Ramos-Morillo H, Lorenzo-Fonseca, (2011) Network intrusion detection system embedded on a smart sensor. IEEE Trans Ind Electron 58:722–732CrossRef
85.
Zurück zum Zitat Santos L, Gonçalves R, Rabadao C, Martins J (2021) A flow-based intrusion detection framework for Internet of Things networks. Cluster Comput 1–21 Santos L, Gonçalves R, Rabadao C, Martins J (2021) A flow-based intrusion detection framework for Internet of Things networks. Cluster Comput 1–21
86.
Zurück zum Zitat Ioulianou P, Vasilakis V, Moscholios I, Logothetis M (2018) A signature-based intrusion detection system for the internet of things. Paper presented at Information and Communication Technology Form, Graz, Austria Ioulianou P, Vasilakis V, Moscholios I, Logothetis M (2018) A signature-based intrusion detection system for the internet of things. Paper presented at Information and Communication Technology Form, Graz, Austria
87.
Zurück zum Zitat Kumar V, Sangwan OP (2012) Signature based intrusion detection system using SNORT. Int J Comput Appl Inf Technol 1:35–41 Kumar V, Sangwan OP (2012) Signature based intrusion detection system using SNORT. Int J Comput Appl Inf Technol 1:35–41
89.
Zurück zum Zitat Muna AL-H, Moustafa N, Sitnikova E (2018) Identification of malicious activities in industrial internet of things based on deep learning models. J Inf Secur Appl 41:1–11 Muna AL-H, Moustafa N, Sitnikova E (2018) Identification of malicious activities in industrial internet of things based on deep learning models. J Inf Secur Appl 41:1–11
90.
Zurück zum Zitat Ashraf, A. H., Imran, M., Qahtani, A. M., Alsufyani, A., Almutiry, O., Mahmood, A., & Habib, M (2021). Weapons Detection for Security and Video Surveillance Using CNN and YOLO-V5s. CMC 1–15. Ashraf, A. H., Imran, M., Qahtani, A. M., Alsufyani, A., Almutiry, O., Mahmood, A., & Habib, M (2021). Weapons Detection for Security and Video Surveillance Using CNN and YOLO-V5s. CMC 1–15.
91.
Zurück zum Zitat Kumar S, Gautam OH (2016) Computational neural network regression model for host based intrusion detection system. Perspect Sci 8:93–95CrossRef Kumar S, Gautam OH (2016) Computational neural network regression model for host based intrusion detection system. Perspect Sci 8:93–95CrossRef
92.
Zurück zum Zitat Moore MR., Bridges RA, Combs FL, Starr MS, Prowell SJ (2017) Modeling inter-signal arrival times for accurate detection of can bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (pp. 1–4) Moore MR., Bridges RA, Combs FL, Starr MS, Prowell SJ (2017) Modeling inter-signal arrival times for accurate detection of can bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (pp. 1–4)
93.
Zurück zum Zitat Olufowobi H, Young C, Zambreno J, Bloom G (2019) Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing. IEEE Trans Vehicular Technol 69:1484–1494CrossRef Olufowobi H, Young C, Zambreno J, Bloom G (2019) Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing. IEEE Trans Vehicular Technol 69:1484–1494CrossRef
94.
Zurück zum Zitat Kumar S, Spafford EH (1996) A pattern matching model for misuse intrusion detection. The COAST Project, Purdue University Kumar S, Spafford EH (1996) A pattern matching model for misuse intrusion detection. The COAST Project, Purdue University
95.
Zurück zum Zitat Kumar S, Spafford EH (1994) An application of pattern matching in intrusion detection. In: Technical Report 94-013, Dept. of Computer Science, Purdue University Kumar S, Spafford EH (1994) An application of pattern matching in intrusion detection. In: Technical Report 94-013, Dept. of Computer Science, Purdue University
96.
Zurück zum Zitat Kumar V, Das AK, Sinha D (2020) Statistical analysis of the UNSW-NB15 dataset for intrusion detection. Computational intelligence in pattern recognition. Springer, Singapore, pp 279–294CrossRef Kumar V, Das AK, Sinha D (2020) Statistical analysis of the UNSW-NB15 dataset for intrusion detection. Computational intelligence in pattern recognition. Springer, Singapore, pp 279–294CrossRef
97.
Zurück zum Zitat Mehmood A, Khanan A, Umar MM, Abdullah S, Ariffin KAZ, Song H (2017) Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6:5688–5694CrossRef Mehmood A, Khanan A, Umar MM, Abdullah S, Ariffin KAZ, Song H (2017) Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6:5688–5694CrossRef
98.
Zurück zum Zitat Rahman MA, Taufiq Asyhari A, Leong LS, Satrya GB, Hai Tao M, Zolkipli MF (2020) Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc 61:102324CrossRef Rahman MA, Taufiq Asyhari A, Leong LS, Satrya GB, Hai Tao M, Zolkipli MF (2020) Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc 61:102324CrossRef
100.
Zurück zum Zitat Alsaadi E, Tubaishat A (2015) Internet of things: features, challenges, and vulnerabilities. Int J Adv Comput Sci Inform Technol 4(1):1–13 Alsaadi E, Tubaishat A (2015) Internet of things: features, challenges, and vulnerabilities. Int J Adv Comput Sci Inform Technol 4(1):1–13
101.
Zurück zum Zitat Sabeel U, Chandra N (2013) Categorized security threats in the wireless sensor networks. Countermeas Security Manag Schem 64:19–28 Sabeel U, Chandra N (2013) Categorized security threats in the wireless sensor networks. Countermeas Security Manag Schem 64:19–28
102.
Zurück zum Zitat Hummen R, Hiller J, Wirtz H, Henze M, Shafagh H, Wehrle K (2013) 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proc 6th ACM Conf Secur Privacy Wirel Mobile Netw, pp. 55–66 Hummen R, Hiller J, Wirtz H, Henze M, Shafagh H, Wehrle K (2013) 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proc 6th ACM Conf Secur Privacy Wirel Mobile Netw, pp. 55–66
103.
Zurück zum Zitat Vacca JR (2012) Computer and information security handbook. Newnes Vacca JR (2012) Computer and information security handbook. Newnes
104.
Zurück zum Zitat Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo KKR (2019) A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Trans Ind Inform 16:5110–5118CrossRef Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo KKR (2019) A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Trans Ind Inform 16:5110–5118CrossRef
105.
Zurück zum Zitat Liu C, Yang J, Chen R, Zhang Y, Zeng J (2011) Research on immunity-based intrusion detection technology for the internet of things. Int Conf Natural Comput IEEE 1:212–216 Liu C, Yang J, Chen R, Zhang Y, Zeng J (2011) Research on immunity-based intrusion detection technology for the internet of things. Int Conf Natural Comput IEEE 1:212–216
106.
Zurück zum Zitat Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-service detection in 6LoWPAN based internet of things. In: 2013 IEEE 9th Int Conf Wirel Mobile Comput, Netw Commun (WiMob), pp. 600–607 Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-service detection in 6LoWPAN based internet of things. In: 2013 IEEE 9th Int Conf Wirel Mobile Comput, Netw Commun (WiMob), pp. 600–607
107.
Zurück zum Zitat Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) An IDS framework for Internet of Things empowered by 6LoWPAN. In Proc 2013 ACM SIGSAC Conf Comput Commun Secur, pp. 1337–1340 Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) An IDS framework for Internet of Things empowered by 6LoWPAN. In Proc 2013 ACM SIGSAC Conf Comput Commun Secur, pp. 1337–1340
108.
110.
Zurück zum Zitat Debar H (2000) An introduction to intrusion-detection systems. In: Proc Connect 2000 Debar H (2000) An introduction to intrusion-detection systems. In: Proc Connect 2000
111.
Zurück zum Zitat Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (IDPS). NIST Spec Publ 800:94 Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (IDPS). NIST Spec Publ 800:94
112.
Zurück zum Zitat Amaral JP, Oliveira LM, Rodrigues JJ, Han G, Shu L (2014) Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In: 2014 IEEE Int Conf Commun (ICC), pp. 1796–1801 Amaral JP, Oliveira LM, Rodrigues JJ, Han G, Shu L (2014) Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In: 2014 IEEE Int Conf Commun (ICC), pp. 1796–1801
113.
Zurück zum Zitat Raza S, Wallgren L, Voigt T (2013) SVELTE: Real-time intrusion detection in the internet of things. Ad hoc Netw 11:2661–2674CrossRef Raza S, Wallgren L, Voigt T (2013) SVELTE: Real-time intrusion detection in the internet of things. Ad hoc Netw 11:2661–2674CrossRef
114.
Zurück zum Zitat Ahmim A, Derdour M, Ferrag MA (2018) An intrusion detection system based on combining probability predictions of a tree of classifiers. Int J Commun Syst 31:e3547CrossRef Ahmim A, Derdour M, Ferrag MA (2018) An intrusion detection system based on combining probability predictions of a tree of classifiers. Int J Commun Syst 31:e3547CrossRef
115.
Zurück zum Zitat Setiadi FF, Kesiman MWA, Aryanto KYE (2021) Detection of dos attacks using naive Bayes method based on Internet of Things (IoT). In: J Physics: Conf Series 1810:012013. IOP Publishing Setiadi FF, Kesiman MWA, Aryanto KYE (2021) Detection of dos attacks using naive Bayes method based on Internet of Things (IoT). In: J Physics: Conf Series 1810:012013. IOP Publishing
116.
Zurück zum Zitat Mukherjee S, Sharma N (2017) Intrusion detection using naive Bayes classifier with feature reduction. Procedia Technol 4:119–128CrossRef Mukherjee S, Sharma N (2017) Intrusion detection using naive Bayes classifier with feature reduction. Procedia Technol 4:119–128CrossRef
117.
Zurück zum Zitat Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. Procedia Comput Sci 60:708–713CrossRef Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. Procedia Comput Sci 60:708–713CrossRef
118.
Zurück zum Zitat Swarnkar M, Hubballi N (2016) OCPAD: One class naive Bayes classifier for payload-based anomaly detection. Expert Syst with Appl 64:330–339CrossRef Swarnkar M, Hubballi N (2016) OCPAD: One class naive Bayes classifier for payload-based anomaly detection. Expert Syst with Appl 64:330–339CrossRef
119.
Zurück zum Zitat Kanwal S, Shah JH, Khan MA, Nisa M, Kadry S, Sharif M, Maheswari M (2021) Person re-identification using adversarial haze attack and defense: a deep learning framework. Comput Electric Eng 96:107542CrossRef Kanwal S, Shah JH, Khan MA, Nisa M, Kadry S, Sharif M, Maheswari M (2021) Person re-identification using adversarial haze attack and defense: a deep learning framework. Comput Electric Eng 96:107542CrossRef
120.
Zurück zum Zitat Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497CrossRef Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497CrossRef
121.
Zurück zum Zitat Majid, A., Khan, M. A., Nam, Y., Tariq, U., Roy, S., Mostafa, R. R., & Sakr, R. H. (2021). COVID19 classification using CT images via ensembles of deep learning models. Computers, Materials and Continua, pp. 319–337. Majid, A., Khan, M. A., Nam, Y., Tariq, U., Roy, S., Mostafa, R. R., & Sakr, R. H. (2021). COVID19 classification using CT images via ensembles of deep learning models. Computers, Materials and Continua, pp. 319–337.
122.
Zurück zum Zitat Mugunthan SR (2020) Decision tree based interference recognition for fog enabled IoT architecture. J Trends Comput Sci Smart Technol (TCSST) 2:15–25CrossRef Mugunthan SR (2020) Decision tree based interference recognition for fog enabled IoT architecture. J Trends Comput Sci Smart Technol (TCSST) 2:15–25CrossRef
123.
Zurück zum Zitat Du W, Zhan Z (2002) Building decision tree classifier on private data. Proc IEEE Int Conf Privacy, Secur Data Min, Aus Comput Soc Inc, Sydney, Aus 14:1–8 Du W, Zhan Z (2002) Building decision tree classifier on private data. Proc IEEE Int Conf Privacy, Secur Data Min, Aus Comput Soc Inc, Sydney, Aus 14:1–8
124.
Zurück zum Zitat Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8:1210CrossRef Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8:1210CrossRef
125.
Zurück zum Zitat Manhas J, Kotwal S (2021) Implementation of intrusion detection system for internet of things using machine learning techniques. Multimedia SECURITY. Springer, Singapore, pp 217–237CrossRef Manhas J, Kotwal S (2021) Implementation of intrusion detection system for internet of things using machine learning techniques. Multimedia SECURITY. Springer, Singapore, pp 217–237CrossRef
126.
Zurück zum Zitat Goeschel K (2016) Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis. In: SoutheastCon, IEEE, 1–6 Goeschel K (2016) Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis. In: SoutheastCon, IEEE, 1–6
129.
Zurück zum Zitat Xu H, Przystupa K, Fang C, Marciniak A, Kochan O, Beshley M (2020) A combination strategy of feature selection based on an integrated optimization algorithm and weighted K-nearest neighbor to improve the performance of network intrusion detection. Electronics 9:1206CrossRef Xu H, Przystupa K, Fang C, Marciniak A, Kochan O, Beshley M (2020) A combination strategy of feature selection based on an integrated optimization algorithm and weighted K-nearest neighbor to improve the performance of network intrusion detection. Electronics 9:1206CrossRef
130.
Zurück zum Zitat Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo K-KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7:314–323CrossRef Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo K-KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7:314–323CrossRef
131.
Zurück zum Zitat Tong S, Koller D (2001) Support vector machine active learning with applications to text classification. J Mach Learn Res 2:45–66 Tong S, Koller D (2001) Support vector machine active learning with applications to text classification. J Mach Learn Res 2:45–66
132.
Zurück zum Zitat Jing D, Chen H (2019) SVM based network intrusion detection for the UNSW-NB15 dataset. 2019 IEEE 13th Int Conf ASIC (ASICON), pp. 1–4 Jing D, Chen H (2019) SVM based network intrusion detection for the UNSW-NB15 dataset. 2019 IEEE 13th Int Conf ASIC (ASICON), pp. 1–4
133.
Zurück zum Zitat Rehman, M. U., Ahmed, F., Khan, M. A., Tariq, U., Alfouzan, F. A., Alzahrani, N. M., & Ahmad, J (2021). Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks. CMC pp. 1–15. Rehman, M. U., Ahmed, F., Khan, M. A., Tariq, U., Alfouzan, F. A., Alzahrani, N. M., & Ahmad, J (2021). Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks. CMC pp. 1–15.
134.
Zurück zum Zitat Liu Y, Pi D (2017) A novel kernel SVM algorithm with game theory for network intrusion detection. KSII Trans Internet Inf Syst 11:4043 Liu Y, Pi D (2017) A novel kernel SVM algorithm with game theory for network intrusion detection. KSII Trans Internet Inf Syst 11:4043
135.
Zurück zum Zitat Hu W, Liao Y, Vemuri VR (2003) Robust support vector machines for anomaly detection in computer security. In: ICMLA pp. 168–174 Hu W, Liao Y, Vemuri VR (2003) Robust support vector machines for anomaly detection in computer security. In: ICMLA pp. 168–174
136.
Zurück zum Zitat Wagner C, François J, Engel T (2011) Machine learning approach for IP-flow record anomaly detection. Int Conf Res Networking. Springer, Berlin, Heidelberg, pp 28–39 Wagner C, François J, Engel T (2011) Machine learning approach for IP-flow record anomaly detection. Int Conf Res Networking. Springer, Berlin, Heidelberg, pp 28–39
137.
Zurück zum Zitat Garg S, Kaur K, Kaddoum G, Gagnon F, Kumar N, Han Z (2019) Sec-IoV: A multi-stage anomaly detection scheme for Internet of vehicles, In: Proc ACM MobiHoc Workshop Pervasive Syst IoT Era, pp. 37–42 Garg S, Kaur K, Kaddoum G, Gagnon F, Kumar N, Han Z (2019) Sec-IoV: A multi-stage anomaly detection scheme for Internet of vehicles, In: Proc ACM MobiHoc Workshop Pervasive Syst IoT Era, pp. 37–42
138.
Zurück zum Zitat Torres JM, Comesaña CI, Garcia-Nieto PJ (2019) Machine learning techniques applied to cybersecurity. Int J Mach Learn Cybernet 10:2823–2836CrossRef Torres JM, Comesaña CI, Garcia-Nieto PJ (2019) Machine learning techniques applied to cybersecurity. Int J Mach Learn Cybernet 10:2823–2836CrossRef
139.
Zurück zum Zitat Ioannou C, Vassiliou V (2019) Classifying security attacks in IoT networks using supervised learning. In: 2019 15th Int Conf Distributed Comput Sensor Syst, IEEE, pp. 652–658 Ioannou C, Vassiliou V (2019) Classifying security attacks in IoT networks using supervised learning. In: 2019 15th Int Conf Distributed Comput Sensor Syst, IEEE, pp. 652–658
141.
142.
Zurück zum Zitat Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2017) Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17:1976CrossRefADS Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2017) Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17:1976CrossRefADS
143.
Zurück zum Zitat Chen, Y., Tao, J., Zhang, Q., Yang, K., Chen, X., Xiong, J., & Xie, J. (2020). Saliency detection via the improved hierarchical principal component analysis method. Wireless communications and mobile computing, 2020. Chen, Y., Tao, J., Zhang, Q., Yang, K., Chen, X., Xiong, J., & Xie, J. (2020). Saliency detection via the improved hierarchical principal component analysis method. Wireless communications and mobile computing2020.
144.
Zurück zum Zitat Islam N, Farhin F, Sultana I, Kaiser MS, Rahman MS, Mahmud M, Sanwar Hosen ASM, Cho GH (2021) Towards machine learning based intrusion detection in IoT networks. Comput Mater Contin 69:1801–1821 Islam N, Farhin F, Sultana I, Kaiser MS, Rahman MS, Mahmud M, Sanwar Hosen ASM, Cho GH (2021) Towards machine learning based intrusion detection in IoT networks. Comput Mater Contin 69:1801–1821
145.
Zurück zum Zitat Zhang J, Zulkernine M (2006) A hybrid network intrusion detection technique using random forests, In First Int Conf on Availability, Reliability Secur (ARES '06), IEEE, p. 8 Zhang J, Zulkernine M (2006) A hybrid network intrusion detection technique using random forests, In First Int Conf on Availability, Reliability Secur (ARES '06), IEEE, p. 8
146.
Zurück zum Zitat Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer Internet of Things devices. In: 2018 IEEE Secur Privacy Workshops (SPW), pp. 29–35 Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer Internet of Things devices. In: 2018 IEEE Secur Privacy Workshops (SPW), pp. 29–35
147.
Zurück zum Zitat Meidan Y, Bohadana M, Shabtai A, Ochoa M, Tippenhauer NO, et al. (2017) Detection of unauthorized IoT devices using machine learning techniques. arXiv preprint arXiv, 1709.04647 Meidan Y, Bohadana M, Shabtai A, Ochoa M, Tippenhauer NO, et al. (2017) Detection of unauthorized IoT devices using machine learning techniques. arXiv preprint arXiv, 1709.​04647
148.
Zurück zum Zitat Woźniak M, Grana M, Corchado E (2014) A survey of multiple classifier systems as hybrid systems. Inf Fusion 16:3–17CrossRef Woźniak M, Grana M, Corchado E (2014) A survey of multiple classifier systems as hybrid systems. Inf Fusion 16:3–17CrossRef
149.
Zurück zum Zitat Illy P, Kaddoum G, Moreira CM, Kaur K, Garg S (2019) Securing fog-to-things environment using intrusion detection system based on ensemble learning. In: 2019 IEEE Wirel Commun Netw Conf (WCNC), pp. 1–7 Illy P, Kaddoum G, Moreira CM, Kaur K, Garg S (2019) Securing fog-to-things environment using intrusion detection system based on ensemble learning. In: 2019 IEEE Wirel Commun Netw Conf (WCNC), pp. 1–7
150.
Zurück zum Zitat Domingos P (2012) A few useful things to know about machine learning. Commun ACM 55:78–87CrossRef Domingos P (2012) A few useful things to know about machine learning. Commun ACM 55:78–87CrossRef
151.
Zurück zum Zitat Zhang H, Liu D, Luo Y, Wang D (2012) Adaptive dynamic programming for control: algorithms and stability. Springer Sci Bus Media Zhang H, Liu D, Luo Y, Wang D (2012) Adaptive dynamic programming for control: algorithms and stability. Springer Sci Bus Media
152.
Zurück zum Zitat Baba MN, Makhtar M, Fadzli SA, Awang MK (2015) Current issues in ensemble methods and its applications. J Theoretical Appl Technol 81:266 Baba MN, Makhtar M, Fadzli SA, Awang MK (2015) Current issues in ensemble methods and its applications. J Theoretical Appl Technol 81:266
153.
Zurück zum Zitat Santana L, Silva L, Canuto AMP, Pintro F, Vale KMO (2010) A comparative analysis of genetic algorithm and ant colony optimization to select attributes for an heterogeneous ensemble of classifiers. In: IEEE Congress Evolutionary Comput, pp. 1–8 Santana L, Silva L, Canuto AMP, Pintro F, Vale KMO (2010) A comparative analysis of genetic algorithm and ant colony optimization to select attributes for an heterogeneous ensemble of classifiers. In: IEEE Congress Evolutionary Comput, pp. 1–8
154.
Zurück zum Zitat Aburomman AA, Reaz MBI (2016) A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl Soft Comput 38:360–372CrossRef Aburomman AA, Reaz MBI (2016) A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl Soft Comput 38:360–372CrossRef
155.
Zurück zum Zitat Gaikwad DP, Thool RC (2015) Intrusion detection system using bagging ensemble method of machine learning. In: 2015 Int Conf Comput Commun Control Automation, IEEE, pp. 291–295 Gaikwad DP, Thool RC (2015) Intrusion detection system using bagging ensemble method of machine learning. In: 2015 Int Conf Comput Commun Control Automation, IEEE, pp. 291–295
157.
Zurück zum Zitat Bosman HHWJ, Iacca G, Tejada A, Wörtche HF, Liotta A (2015) Ensembles of incremental learners to detect anomalies in ad hoc sensor networks. Ad Hoc Netw 35:14–36CrossRef Bosman HHWJ, Iacca G, Tejada A, Wörtche HF, Liotta A (2015) Ensembles of incremental learners to detect anomalies in ad hoc sensor networks. Ad Hoc Netw 35:14–36CrossRef
158.
Zurück zum Zitat Hussain N, Khan MA, Kadry S, Tariq U, Mostafa RR, Choi JI, Nam Y (2021) Intelligent deep learning and improved whale optimization algorithm based framework for object recognition. Hum Cent Comput Inf Sci 11:34 CrossRef Hussain N, Khan MA, Kadry S, Tariq U, Mostafa RR, Choi JI, Nam Y (2021) Intelligent deep learning and improved whale optimization algorithm based framework for object recognition. Hum Cent Comput Inf Sci 11:34 CrossRef
159.
Zurück zum Zitat Hartigan J, Wong MA (1979) AK-means clustering algorithm. J Royal Stat Soc: Series C Appl Stat 28:100–108 Hartigan J, Wong MA (1979) AK-means clustering algorithm. J Royal Stat Soc: Series C Appl Stat 28:100–108
160.
Zurück zum Zitat Bhuyan M, Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16:303–336CrossRef Bhuyan M, Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16:303–336CrossRef
161.
Zurück zum Zitat Kanjanawattana S (2019) A novel outlier detection applied to an adaptive k-means. Int J Mach Learning Comput 9:569–574CrossRef Kanjanawattana S (2019) A novel outlier detection applied to an adaptive k-means. Int J Mach Learning Comput 9:569–574CrossRef
162.
Zurück zum Zitat Muniyandi AP, Rajeswari R, Rajaram R (2012) Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithms. Procedia Eng 30:174–182CrossRef Muniyandi AP, Rajeswari R, Rajaram R (2012) Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithms. Procedia Eng 30:174–182CrossRef
163.
Zurück zum Zitat Alharbi S, Rodriguez P, Maharaja R, Iyer P, Subaschandrabose N, Ye Z (2017) Secure the Internet of Things with challenge response authentication in fog computing. In: 2017 IEEE 36th Int Performance Comput Commun Conf (IPCCC), pp. 1–2 Alharbi S, Rodriguez P, Maharaja R, Iyer P, Subaschandrabose N, Ye Z (2017) Secure the Internet of Things with challenge response authentication in fog computing. In: 2017 IEEE 36th Int Performance Comput Commun Conf (IPCCC), pp. 1–2
164.
Zurück zum Zitat Cintuglu MH, Mohammed OA, Akkaya K, Uluagac AS (2016) A survey on smart grid cyber-physical system testbeds. IEEE Commun Surv Tutor 19:446CrossRef Cintuglu MH, Mohammed OA, Akkaya K, Uluagac AS (2016) A survey on smart grid cyber-physical system testbeds. IEEE Commun Surv Tutor 19:446CrossRef
165.
Zurück zum Zitat Sellappan D, Srinivasan R (2020) Association rule-mining-based intrusion detection system with entropy-based feature selection: Intrusion detection system. In Handbook of Research on Intelligent Data Processing and Information Security Systems, IGI Global, pp. 1–24 Sellappan D, Srinivasan R (2020) Association rule-mining-based intrusion detection system with entropy-based feature selection: Intrusion detection system. In Handbook of Research on Intelligent Data Processing and Information Security Systems, IGI Global, pp. 1–24
166.
Zurück zum Zitat Markam V, Dubey LSM (2012) A general study of associations rule mining in intrusion detection system. Int J Emerg Technol Adv Eng 2:347–356 Markam V, Dubey LSM (2012) A general study of associations rule mining in intrusion detection system. Int J Emerg Technol Adv Eng 2:347–356
167.
Zurück zum Zitat Manimurugan S (2021) IoT-fog-cloud model for anomaly detection using improved naïve Bayes and principal component analysis. J Ambient Intell Humanized Comput, pp. 1–10 Manimurugan S (2021) IoT-fog-cloud model for anomaly detection using improved naïve Bayes and principal component analysis. J Ambient Intell Humanized Comput, pp. 110
168.
Zurück zum Zitat Zhao S, Li W, Zia T, Zomaya AY (2017) A dimension reduction model and classifier for anomaly-based intrusion detection in Internet of Things. In: 2017 IEEE 15th Intl Conf Dependable, Autonomic Secure Comput, 15th Intl Conf Pervasive Intell Comput, 3rd Intl Conf Big Data Intell Comput Cyber Science and Technol Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 836–843 Zhao S, Li W, Zia T, Zomaya AY (2017) A dimension reduction model and classifier for anomaly-based intrusion detection in Internet of Things. In: 2017 IEEE 15th Intl Conf Dependable, Autonomic Secure Comput, 15th Intl Conf Pervasive Intell Comput, 3rd Intl Conf Big Data Intell Comput Cyber Science and Technol Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 836–843
169.
Zurück zum Zitat Hoang DH, Nguyen HD (2019) Detecting anomalous network traffic in IoT networks, In 2019 21st Int Conf Adv Commun Technol (ICACT), pp. 1143–1152 Hoang DH, Nguyen HD (2019) Detecting anomalous network traffic in IoT networks, In 2019 21st Int Conf Adv Commun Technol (ICACT), pp. 1143–1152
170.
Zurück zum Zitat Hussain J, Lalmuanawma S (2016) Feature analysis, evaluation and comparisons of classification algorithms based on noisy intrusion dataset. Procedia Comput Sci 92:188–198CrossRef Hussain J, Lalmuanawma S (2016) Feature analysis, evaluation and comparisons of classification algorithms based on noisy intrusion dataset. Procedia Comput Sci 92:188–198CrossRef
171.
Zurück zum Zitat Ashfaq RAR, Wang X, Huang JZ, Abbas H, He Y (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inf Sci 378:484–497CrossRef Ashfaq RAR, Wang X, Huang JZ, Abbas H, He Y (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inf Sci 378:484–497CrossRef
172.
Zurück zum Zitat Raman MRG, Somu N, Kirthivasan K, Sriram VSS (2017) A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw 92:89–97PubMedCrossRef Raman MRG, Somu N, Kirthivasan K, Sriram VSS (2017) A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw 92:89–97PubMedCrossRef
173.
Zurück zum Zitat McHugh J (2000) Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans Inf Syst Secur (TISSEC) 3:262–294CrossRef McHugh J (2000) Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans Inf Syst Secur (TISSEC) 3:262–294CrossRef
174.
Zurück zum Zitat Moustafa N, Slay J (2015) UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Commun Inf Syst Conf (MilCIS), pp. 1–6. IEEE Moustafa N, Slay J (2015) UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Commun Inf Syst Conf (MilCIS), pp. 1–6. IEEE
175.
Zurück zum Zitat Sharafaldin I, Gharib A, Lashkari AH, Ghorbani AA (2018) Towards a reliable intrusion detection benchmark dataset. Softw Netw 1:177–200 Sharafaldin I, Gharib A, Lashkari AH, Ghorbani AA (2018) Towards a reliable intrusion detection benchmark dataset. Softw Netw 1:177–200
176.
Zurück zum Zitat Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31:357–374CrossRef Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31:357–374CrossRef
177.
Zurück zum Zitat Nehinbe JO (2009) A simple method for improving intrusion detections in corporate networks. Int Conf Inf Secur Digital Forensics. Springer, Berlin, Germany, pp 111–122 Nehinbe JO (2009) A simple method for improving intrusion detections in corporate networks. Int Conf Inf Secur Digital Forensics. Springer, Berlin, Germany, pp 111–122
178.
Zurück zum Zitat Sharafaldin I, Lashkari AH, Ghorbani AA (2018) A detailed analysis of the CICIDS2017 data set. Int Conf Inf Syst Security Privacy. Springer, Cham, pp 172–188 Sharafaldin I, Lashkari AH, Ghorbani AA (2018) A detailed analysis of the CICIDS2017 data set. Int Conf Inf Syst Security Privacy. Springer, Cham, pp 172–188
179.
Zurück zum Zitat Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gen Comput Syst 100:779–796CrossRef Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gen Comput Syst 100:779–796CrossRef
181.
Zurück zum Zitat Pahl M-O, Aubet F-X (2018) All eyes on you: Distributed multi-dimensional IoT microservice anomaly detection. In: 2018 14th Int Conf Netw Service Manag (CNSM), pp. 72–80. IEEE Pahl M-O, Aubet F-X (2018) All eyes on you: Distributed multi-dimensional IoT microservice anomaly detection. In: 2018 14th Int Conf Netw Service Manag (CNSM), pp. 72–80. IEEE
182.
Zurück zum Zitat Masduki BW, Ramli K, Saputra FA, Sugiarto D (2015) Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS). In: 2015 Int Conf Quality Res (QiR), IEEE, pp. 56–64 Masduki BW, Ramli K, Saputra FA, Sugiarto D (2015) Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS). In: 2015 Int Conf Quality Res (QiR), IEEE, pp. 56–64
183.
Zurück zum Zitat Bhuyan M, Bhattacharyya DK, Kalita JK (2015) Towards generating real-life datasets for network intrusion detection. Int J Netw Secur 17:683–701 Bhuyan M, Bhattacharyya DK, Kalita JK (2015) Towards generating real-life datasets for network intrusion detection. Int J Netw Secur 17:683–701
184.
Zurück zum Zitat Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSp, pp. 108–116 Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSp, pp. 108–116
185.
Zurück zum Zitat Hindy H, Brosset D, Bayne E, Seeam A, Tachtatzis C, Atkinson R, Bellekens X (2018) A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. Hindy H, Brosset D, Bayne E, Seeam A, Tachtatzis C, Atkinson R, Bellekens X (2018) A taxonomy and survey of intrusion detection system design techniques, network threats and datasets.
186.
Zurück zum Zitat Singh G, Khare N (2021) A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. Int J Comput Appl pp. 1–11 Singh G, Khare N (2021) A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. Int J Comput Appl pp. 1–11
187.
Zurück zum Zitat Kushwah GS, Ranga V (2020) Voting extreme learning machine based distributed denial of service attack detection in cloud computing. J Inform Security Appl 53:102532 Kushwah GS, Ranga V (2020) Voting extreme learning machine based distributed denial of service attack detection in cloud computing. J Inform Security Appl 53:102532
188.
Zurück zum Zitat Sultan S, Javaid Q, Malik AJ, Al-Turjman F, Attique M (2021) Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks. Environ, Develop Sustain, pp. 1–19 Sultan S, Javaid Q, Malik AJ, Al-Turjman F, Attique M (2021) Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks. Environ, Develop Sustain, pp. 1–19
189.
Zurück zum Zitat Kanwal S, Iqbal Z, Al-Turjman F, Irtaza A, Khan MA (2021) Multiphase fault tolerance genetic algorithm for VM and task scheduling in datacenter. Inf Process Manag 58:102676CrossRef Kanwal S, Iqbal Z, Al-Turjman F, Irtaza A, Khan MA (2021) Multiphase fault tolerance genetic algorithm for VM and task scheduling in datacenter. Inf Process Manag 58:102676CrossRef
190.
Zurück zum Zitat Ansari GJ, Shah JH, Sharif M, Tariq U, Akram T (2021) A non-blind deconvolution semi pipelined approach to understand text in blurry natural images for edge intelligence. Inf Process Manag 58:102675CrossRef Ansari GJ, Shah JH, Sharif M, Tariq U, Akram T (2021) A non-blind deconvolution semi pipelined approach to understand text in blurry natural images for edge intelligence. Inf Process Manag 58:102675CrossRef
191.
Zurück zum Zitat Sharif A, Li JP, Saleem MA, Manogran G, Kadry S, Basit A, Khan MA (2021) A dynamic clustering technique based on deep reinforcement learning for internet of vehicles. J Intell Manuf 32:757–768CrossRef Sharif A, Li JP, Saleem MA, Manogran G, Kadry S, Basit A, Khan MA (2021) A dynamic clustering technique based on deep reinforcement learning for internet of vehicles. J Intell Manuf 32:757–768CrossRef
192.
Zurück zum Zitat Almadhor A, Rauf HT, Khan MA, Kadry S, Nam Y (2021) A hybrid algorithm (BAPSO) for capacity configuration optimization in a distributed solar PV based microgrid. Energ Rep, ISSN 2352–4847 Almadhor A, Rauf HT, Khan MA, Kadry S, Nam Y (2021) A hybrid algorithm (BAPSO) for capacity configuration optimization in a distributed solar PV based microgrid. Energ Rep, ISSN 2352–4847
193.
Zurück zum Zitat Saeed R, Rubab S, Asif S, Khan MM, Murtaza S, Kadry S, Nam Y, Khan MA (2021) An automated system to predict popular cybersecurity news using document embeddings. Comput Modeling Eng Sci 127:533–547CrossRef Saeed R, Rubab S, Asif S, Khan MM, Murtaza S, Kadry S, Nam Y, Khan MA (2021) An automated system to predict popular cybersecurity news using document embeddings. Comput Modeling Eng Sci 127:533–547CrossRef
194.
Zurück zum Zitat Zhang Y-D, Alhusseni M, Kadry S, Wang S-H, Saba T, Iqbal T (2021) A fused heterogeneous deep neural network and robust feature selection framework for human actions recognition. Arabian J Sci Eng pp. 1–16 Zhang Y-D, Alhusseni M, Kadry S, Wang S-H, Saba T, Iqbal T (2021) A fused heterogeneous deep neural network and robust feature selection framework for human actions recognition. Arabian J Sci Eng pp. 1–16
195.
Zurück zum Zitat Ahmed M, Ramzan M, Khan HU, Iqbal S, Choi J-I, Nam Y, Kadry S (2021) Real-time violent action recognition using key frames extraction and deep learning. CMC-Comput Mater Continua 69:2217–2230CrossRef Ahmed M, Ramzan M, Khan HU, Iqbal S, Choi J-I, Nam Y, Kadry S (2021) Real-time violent action recognition using key frames extraction and deep learning. CMC-Comput Mater Continua 69:2217–2230CrossRef
196.
Zurück zum Zitat Nasir IM, Raza M, Shah JH, Khan MA, Rehman A (2021) Human action recognition Using machine learning in uncontrolled environment. In: 2021 1st Int Conf Artif Intell Data Analyt (CAIDA), IEEE, pp. 182–187 Nasir IM, Raza M, Shah JH, Khan MA, Rehman A (2021) Human action recognition Using machine learning in uncontrolled environment. In: 2021 1st Int Conf Artif Intell Data Analyt (CAIDA), IEEE, pp. 182–187
197.
Zurück zum Zitat Kiran S, Javed MY, Alhaisoni M, Tariq U, Nam Y, Damaševicius R, Sharif M (2021) Multi-layered deep learning features fusion for human action recognition. CMC-Comput Mater Continua 69:4061–4075CrossRef Kiran S, Javed MY, Alhaisoni M, Tariq U, Nam Y, Damaševicius R, Sharif M (2021) Multi-layered deep learning features fusion for human action recognition. CMC-Comput Mater Continua 69:4061–4075CrossRef
198.
Zurück zum Zitat Khan MA, Alhaisoni M, Armghan A, Alenezi F, Tariq U, Nam Y, Akram T (2021) Video analytics framework for human action recognition. CMC-Comput Mater Continua 68:3841–3859CrossRef Khan MA, Alhaisoni M, Armghan A, Alenezi F, Tariq U, Nam Y, Akram T (2021) Video analytics framework for human action recognition. CMC-Comput Mater Continua 68:3841–3859CrossRef
199.
Zurück zum Zitat Zhang Y-D, Khan SA, Attique M, Rehman A, Seo S (2020) A resource conscious human action recognition framework using 26-layered deep convolutional neural network. Multimed Tools Appl, pp. 1–23 Zhang Y-D, Khan SA, Attique M, Rehman A, Seo S (2020) A resource conscious human action recognition framework using 26-layered deep convolutional neural network. Multimed Tools Appl, pp. 1–23
200.
Zurück zum Zitat Javed K, Khan SA, Saba T, Habib U, Khan JA, Abbasi AA (2020) Human action recognition using fusion of multiview and deep features: an application to video surveillance. Multimed Tools Applications, pp. 1–27 Javed K, Khan SA, Saba T, Habib U, Khan JA, Abbasi AA (2020) Human action recognition using fusion of multiview and deep features: an application to video surveillance. Multimed Tools Applications, pp. 1–27
201.
Zurück zum Zitat Hussain UN, Lali IU, Javed K, Ashraf I, Tariq J, Ali H, Din A (2020) A unified design of ACO and skewness based brain tumor segmentation and classification from MRI scans. J Control Eng Appl Inform 22:43–55 Hussain UN, Lali IU, Javed K, Ashraf I, Tariq J, Ali H, Din A (2020) A unified design of ACO and skewness based brain tumor segmentation and classification from MRI scans. J Control Eng Appl Inform 22:43–55
202.
Zurück zum Zitat Sharif M, Akram T, Bukhari SAC, Nayak RS (2020) Developed Newton-Raphson based deep features selection framework for skin lesion recognition. Pattern Recognit Lett 129:293–303CrossRefADS Sharif M, Akram T, Bukhari SAC, Nayak RS (2020) Developed Newton-Raphson based deep features selection framework for skin lesion recognition. Pattern Recognit Lett 129:293–303CrossRefADS
203.
Zurück zum Zitat Sharif M, Akram T, Damaševičius R, Maskeliūnas R (2021) Skin lesion segmentation and multiclass classification using deep learning features and improved moth flame optimization. Diagnostics 11:811PubMedPubMedCentralCrossRef Sharif M, Akram T, Damaševičius R, Maskeliūnas R (2021) Skin lesion segmentation and multiclass classification using deep learning features and improved moth flame optimization. Diagnostics 11:811PubMedPubMedCentralCrossRef
205.
Zurück zum Zitat Zhang Y-D, Sharif M, Akram T (2021) Pixels to classes: intelligent learning framework for multiclass skin lesion localization and classification. Comput Electric Eng 90:106956CrossRef Zhang Y-D, Sharif M, Akram T (2021) Pixels to classes: intelligent learning framework for multiclass skin lesion localization and classification. Comput Electric Eng 90:106956CrossRef
206.
Zurück zum Zitat Qasim M, Lodhi HMJ, Nazir M, Javed K, Rubab S, Din A, Habib U (2021) Automated design for recognition of blood cells diseases from hematopathology using classical features selection and ELM. Microscopy Res Tech 84:202–216CrossRef Qasim M, Lodhi HMJ, Nazir M, Javed K, Rubab S, Din A, Habib U (2021) Automated design for recognition of blood cells diseases from hematopathology using classical features selection and ELM. Microscopy Res Tech 84:202–216CrossRef
207.
Zurück zum Zitat Tahir ABT, Alhaisoni M, Khan JA, Nam Y, Wang S-H, Javed K (2021) Deep learning and improved particle swarm optimization based multimodal brain tumor classification. CMC-Comput Mater Continua 68:1099–1116CrossRef Tahir ABT, Alhaisoni M, Khan JA, Nam Y, Wang S-H, Javed K (2021) Deep learning and improved particle swarm optimization based multimodal brain tumor classification. CMC-Comput Mater Continua 68:1099–1116CrossRef
208.
Zurück zum Zitat Akram T, Sharif M, Kadry S, Nam Y (2021) Computer decision support system for skin cancer localization and classification. CMC-Comput Mater Continua 68:1041–1064CrossRef Akram T, Sharif M, Kadry S, Nam Y (2021) Computer decision support system for skin cancer localization and classification. CMC-Comput Mater Continua 68:1041–1064CrossRef
209.
Zurück zum Zitat Mehmood A, Sharif M, Khan SA, Shaheen M, Saba T, Riaz N, Ashraf I (2020) Prosperous human gait recognition: an end-to-end system based on pre-trained CNN features selection. Multimed Tools Appl, pp. 1–21 Mehmood A, Sharif M, Khan SA, Shaheen M, Saba T, Riaz N, Ashraf I (2020) Prosperous human gait recognition: an end-to-end system based on pre-trained CNN features selection. Multimed Tools Appl, pp. 1–21
210.
Zurück zum Zitat Hussain N, Sharif M, Khan SA, Albesher AA, Saba T, Armaghan A. (2020) A deep neural network and classical features based scheme for objects recognition: an application for machine inspection. Multimed Tools Appl,pp. 1–23 Hussain N, Sharif M, Khan SA, Albesher AA, Saba T, Armaghan A. (2020) A deep neural network and classical features based scheme for objects recognition: an application for machine inspection. Multimed Tools Appl,pp. 1–23
Metadaten
Titel
RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures
verfasst von
Eid Rehman
Muhammad Haseeb-ud-Din
Arif Jamal Malik
Tehmina Karmat Khan
Aaqif Afzaal Abbasi
Seifedine Kadry
Muhammad Attique Khan
Seungmin Rho
Publikationsdatum
14.01.2022
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2022
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-021-04188-3

Weitere Artikel der Ausgabe 6/2022

The Journal of Supercomputing 6/2022 Zur Ausgabe

Premium Partner