1 |
Young-Teak Oh, In-June Jo, "Data Modeling for Cyber Security of IoT in Artificial Intelligence Technology", International JOURNAL OF CONTENTS, Vol. 21, No. 12, pp 58-65, 2021.
|
2 |
Markts and Markets, "IoT Solutions and Service Market", https://www.marketsandmarkets.com/Market-Reports, TC7719, 2022.
|
3 |
IEEE Computer Society, "Internet of Things Meets the Military and Battlefield", https://www.computer.org/publications/tech-news/research/internet-of-military-battlefield-things-iomt-iobt, 2022.
|
4 |
Korea Defense Industry Accociation, "Development of defense IoT platform and solution for future intelligent resource management and battlefield management system", Defense & Technology, Vol 470, No. 28, pp 28-29, 2018.
|
5 |
Ahmad, Rasheed, and Izzat Alsmadi. "Machine learning approaches to IoT security: A systematic literature review." Internet of Things Vol. 14, 2021.
|
6 |
Y. Jang, J. Shim, and S. Park, "Analysis Standardized of IoT-based Low-power.Light -weight Protocol," Journal of the Korea Institute of Information and Communication Engineering, vol. 20, no. 10, pp. 1895-1902, Oct. 2016.
DOI
|
7 |
I. Skerritt, "IoT Developer Survey 2016," Eclipse IoT Work. Gruop, IEEE IoT Agil. IoT, 2016.
|
8 |
Ivan Vaccari, Giovanni Chiola, Maurizio Aiello, Maurizio Monelli, Enrico Cambiaso, "MQTTset, a New Dataset for Machine Learning Techniques on MQTT", Sensors, Vol. 20, 2020.
|
9 |
Kuriakose, Neenu, and Uma Devi. "MQTT Attack Detection Using AI and ML Algorithm." Pervasive Computing and Social Networking. Springer, Singapore, Vol. 317, 2022. 13-22.
|
10 |
Dissanayake, Maheshi B. "Feature Engineering for Cyber-attack detection in Internet of Things.", I.J Wireless and Microwave Technologies, Vol. 6, pp 46-54, 2021.
|
11 |
Rachmadi, Salman, Satria Mandala, and Dita Oktaria. "Detection of DoS Attack using AdaBoost Algorithm on IoT System", 2021 International Conference on Data Science and Its Applications (ICoDSA). IEEE, 2021.
|
12 |
Lee, Joohwa, and Keehyun Park. "Network Intrusion Detection System Using Feature Extraction Based on AutoEncoder in IOT environment." KTSDE, Vol. 8, No. 12, pp 483-490, 2019.
|
13 |
Hyoseon Kyew, Minhae Kwon, "PCA-Based Low-Complexity Anomaly", KCIS, Vol. 46, No. 6, pp 941-955, 2021.
|
14 |
Ke, Guolin, et al. "Lightgbm: A highly efficient gradient boosting decision tree." Advances in neural information processing systems 30, 2017.
|
15 |
Waskle, Subhash, Lokesh Parashar, and Upendra Singh. "Intrusion detection system using PCA with random forest approach." 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp. 803-808, 2020.
|
16 |
Martinez, Aleix M., and Avinash C. Kak. "Pcaversus lda." IEEE transactions on pattern analysis and machine intelligence Vol. 23, No. 2, pp 228-233, 2001.
DOI
|
17 |
Zebari, R., Abdulazeez, A., Zeebaree, D., Zebari, D. and Saeed, J. "A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction.", Journal of Applied Science and Technology Trends Vol. 1, No. 2, pp. 56-70, 2020.
DOI
|