1 |
Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D. Guarnizo & Y. Elovici. (2017). Detection of unauthorized iot devices using machine learning techniques. preprint arXiv:1709.04647.
|
2 |
A. Shahnaz, U. Qamar & A. Khalid, (2019). Using Blockchain for Electronic Health Records. IEEE Access, 7, pp. 147782-147795.
DOI
|
3 |
S. Son, J. Y. Lee, M. H. Kim, S. J. Yu, A. K. Das & Y. H. Park, (2020). Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain. IEEE Access, 8, 192177-192191.
DOI
|
4 |
X. Yang, X. Pei, M. Wang, T. Li & C. Wang, (2020). Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain. IEEE Access, 8, 144809-144822.
DOI
|
5 |
M. K. Choi, C. Y. Yeun & P. H. Seong, (2020). A Novel Monitoring System for the Data Integrity of Reactor Protection System Using Blockchain Technology. IEEE Access, 8, 118732-118740.
DOI
|
6 |
A. Majumdar & G. Mohan, (2020). Distributed Fractionalized Data Networks For Data Integrity. Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-3.
|
7 |
U. Imtiaz & H. M. Qusay. (2019). A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks. Proceedings of the 2019 16th IEEE Annual Consumer Communications & Networking Conference(CCNC), 1-6.
|
8 |
Machine Learning Repository. (2021). https://archive.ics.uci.edu/ml/index.php
|
9 |
K. Igor, S. Igor & B. Alexander. (2018). Framework for Mobiel Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning. IEEE ACCESS, 6, 72714-72723.
DOI
|
10 |
T. Mahbod, B. Ebrahim, L. Wei & A. G. Ali. (2009). A Detailed Analysis of the KDD CUP 99 Data Set. Proceedings of the 2009 IEEE symposium on computational Intelligence in security and defence application, 1-6.
|
11 |
NSL, http://www.nsl.cs.unb.ca/NSL-KDD.
|
12 |
H. Chae & S. H. Choi. (2014). Feature Selection for efficient Intrusion Detection using Attribute Ratio. International Journal of Computers and Communications, 8, 134-139.
|
13 |
P. Huang, K. Fan, H. Yang, K. Zhang, H. Li & Y. Yang, (2020). A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System. IEEE Access, 8, 94780-94794.
DOI
|
14 |
Machine Learning Repository. (2021). https://archive.ics.uci.edu/ml/datasets.php?format=&task=&att=&area=&numAtt=greater100&numIns=&type=seq&sort=nameDown&view=list.
|
15 |
B. Ravishankar, P. Kulkarni & M. V. Vishnudas, (2020). Blockchain-based Database to Ensure Data Integrity in Cloud Computing Environments. Proceedings of the 2020 International conference on Mainstreaming Block chain Implementation (ICOMBI), 1-4.
|