A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges
Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical environment with the cyber world and create one big intelligent network. This technology has been applied to various application domains such as develo...
Gespeichert in:
| Veröffentlicht in: | Archives of computational methods in engineering Jg. 28; H. 4; S. 3211 - 3243 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Dordrecht
Springer Netherlands
01.06.2021
Springer Nature B.V |
| Schlagworte: | |
| ISSN: | 1134-3060, 1886-1784 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical environment with the cyber world and create one big intelligent network. This technology has been applied to various application domains such as developing smart home, smart cities, healthcare applications, wireless sensor networks, cloud environment, enterprise network, web applications, and smart grid technologies. These wide emerging applications in variety of domains raise many security issues such as protecting devices and network, attacks in IoT networks, and managing resource-constrained IoT networks. To address the scalability and resource-constrained security issues, many security solutions have been proposed for IoT such as web application firewalls and intrusion detection systems. In this paper, a comprehensive survey on Intrusion Detection System (IDS) for IoT is presented for years 2015–2019. We have discussed various IDS placement strategies and IDS analysis strategies in IoT architecture. The paper discusses various intrusions in IoT, along with Machine Learning (ML) and Deep Learning (DL) techniques for detecting attacks in IoT networks. The paper also discusses security issues and challenges in IoT. |
|---|---|
| AbstractList | Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical environment with the cyber world and create one big intelligent network. This technology has been applied to various application domains such as developing smart home, smart cities, healthcare applications, wireless sensor networks, cloud environment, enterprise network, web applications, and smart grid technologies. These wide emerging applications in variety of domains raise many security issues such as protecting devices and network, attacks in IoT networks, and managing resource-constrained IoT networks. To address the scalability and resource-constrained security issues, many security solutions have been proposed for IoT such as web application firewalls and intrusion detection systems. In this paper, a comprehensive survey on Intrusion Detection System (IDS) for IoT is presented for years 2015–2019. We have discussed various IDS placement strategies and IDS analysis strategies in IoT architecture. The paper discusses various intrusions in IoT, along with Machine Learning (ML) and Deep Learning (DL) techniques for detecting attacks in IoT networks. The paper also discusses security issues and challenges in IoT. |
| Author | Thakkar, Ankit Lohiya, Ritika |
| Author_xml | – sequence: 1 givenname: Ankit surname: Thakkar fullname: Thakkar, Ankit organization: Department of Computer Science and Engineering, Institute of Technology, Nirma University – sequence: 2 givenname: Ritika orcidid: 0000-0003-1794-8300 surname: Lohiya fullname: Lohiya, Ritika email: 18ftphde30@nirmauni.ac.in organization: Department of Computer Science and Engineering, Institute of Technology, Nirma University |
| BookMark | eNp9kEtLLDEQRoMo-PwDrgJub2sl6U53u5PxNTCi-FiHdLpaI2PSN8ko4p834wiCC1cJRZ2vqs42WXfeISH7DA4ZQH0UGWsEK4BDAW3ZygLWyBZrGlmwuinX85-JshAgYZNsx_gMUJVty7fIxwm9xVeLb9Q7eqXNk3VIZ6iDs-6RatfTU8Txp3KDIY5okn3FSP1Ap6d3dPCBTv39cU4y6BJ9GHudMP6jd2gWwaZ3Oo1xsSws8yZPej5H94hxl2wMeh5x7_vdIQ_nZ_eTy2J2fTGdnMwKI1ibCtZJXbWCgaxLM_QoB9ED62vQvOuqvu54ZxC7UmrZAPJeGo1MGs4r7LHKh--Qg1XuGPz_vEdSz34RXB6peCW4BBAcchdfdZngYww4qDHYFx3eFQO1lKxWklWWrL4kqyXU_IKMTTpZ71LQdv43KlZozHOyjvCz1R_UJ7G_kuc |
| CitedBy_id | crossref_primary_10_1002_itl2_558 crossref_primary_10_1109_JIOT_2024_3457894 crossref_primary_10_3390_jsan14040078 crossref_primary_10_1145_3695998 crossref_primary_10_1016_j_cose_2024_104034 crossref_primary_10_1007_s11831_023_09943_8 crossref_primary_10_1007_s12652_022_04350_6 crossref_primary_10_1108_IJPCC_12_2023_0358 crossref_primary_10_3390_electronics14153015 crossref_primary_10_1109_ACCESS_2024_3362670 crossref_primary_10_1007_s11277_022_09487_3 crossref_primary_10_32604_cmc_2024_055891 crossref_primary_10_1016_j_iot_2023_100773 crossref_primary_10_1109_ACCESS_2025_3602840 crossref_primary_10_1007_s11227_023_05616_2 crossref_primary_10_1155_2023_6048087 crossref_primary_10_1016_j_procs_2025_03_315 crossref_primary_10_3390_s24186035 crossref_primary_10_1016_j_jnca_2022_103419 crossref_primary_10_1016_j_cose_2025_104542 crossref_primary_10_1109_ACCESS_2025_3579990 crossref_primary_10_1007_s11227_024_06409_x crossref_primary_10_1109_ACCESS_2024_3386631 crossref_primary_10_2139_ssrn_5046099 crossref_primary_10_1109_ACCESS_2025_3609003 crossref_primary_10_1109_TITS_2025_3558849 crossref_primary_10_1007_s10845_024_02536_7 crossref_primary_10_1007_s11277_023_10363_x crossref_primary_10_3390_electronics10141633 crossref_primary_10_1016_j_inffus_2025_103102 crossref_primary_10_1016_j_iswa_2023_200189 crossref_primary_10_1080_21642583_2024_2321381 crossref_primary_10_1109_JIOT_2025_3542845 crossref_primary_10_3390_fi17080351 crossref_primary_10_3390_s22218417 crossref_primary_10_1016_j_aej_2024_12_061 crossref_primary_10_1016_j_dsp_2025_105153 crossref_primary_10_1109_ACCESS_2023_3250235 crossref_primary_10_1109_ACCESS_2024_3462297 crossref_primary_10_3390_sym17070997 crossref_primary_10_1007_s42979_023_01770_9 crossref_primary_10_1007_s11227_025_07821_7 crossref_primary_10_3390_s23218701 crossref_primary_10_1016_j_iot_2023_100792 crossref_primary_10_1016_j_measen_2022_100459 crossref_primary_10_1109_ACCESS_2025_3574672 crossref_primary_10_3390_electronics11040524 crossref_primary_10_7717_peerj_cs_2745 crossref_primary_10_3390_s22249957 crossref_primary_10_1109_ACCESS_2025_3605171 crossref_primary_10_1007_s11831_022_09741_8 crossref_primary_10_1109_ACCESS_2024_3355794 crossref_primary_10_62486_latia20249 crossref_primary_10_1016_j_icte_2025_01_005 crossref_primary_10_1007_s11042_024_20410_9 crossref_primary_10_1007_s11277_023_10773_x crossref_primary_10_4018_IJCAC_386134 crossref_primary_10_1007_s10844_023_00819_8 crossref_primary_10_7717_peerj_cs_2290 crossref_primary_10_1016_j_eswa_2025_128899 crossref_primary_10_1109_ACCESS_2023_3332909 crossref_primary_10_1007_s42979_023_02105_4 crossref_primary_10_1007_s10462_021_10037_9 crossref_primary_10_1109_JIOT_2023_3328795 crossref_primary_10_1109_ACCESS_2023_3349287 crossref_primary_10_1002_nem_2294 crossref_primary_10_1016_j_iot_2024_101135 crossref_primary_10_1007_s10845_024_02535_8 crossref_primary_10_1016_j_neucom_2023_126533 crossref_primary_10_1007_s12652_022_04362_2 crossref_primary_10_1109_JIOT_2023_3244810 crossref_primary_10_1080_1206212X_2024_2400148 crossref_primary_10_3390_s23167256 crossref_primary_10_3390_s22093438 crossref_primary_10_3390_electronics12041044 crossref_primary_10_32604_cmc_2024_059805 crossref_primary_10_3390_electronics12122650 crossref_primary_10_1007_s11760_021_02116_9 crossref_primary_10_3390_electronics13234611 crossref_primary_10_1155_2022_5988567 crossref_primary_10_3390_electronics13163210 crossref_primary_10_32604_cmes_2022_020724 crossref_primary_10_1016_j_comcom_2022_09_012 crossref_primary_10_1016_j_jksuci_2023_101866 crossref_primary_10_1007_s11276_023_03517_z crossref_primary_10_1109_JIOT_2023_3234530 crossref_primary_10_1007_s44163_022_00042_4 crossref_primary_10_1109_ACCESS_2023_3319814 crossref_primary_10_1016_j_jksuci_2021_04_003 crossref_primary_10_1038_s41598_025_01052_9 crossref_primary_10_1007_s10207_023_00684_0 crossref_primary_10_3390_electronics12234806 crossref_primary_10_1002_eng2_70338 crossref_primary_10_1186_s42400_023_00169_6 crossref_primary_10_1016_j_iot_2023_100851 crossref_primary_10_1038_s41598_025_99574_9 crossref_primary_10_2139_ssrn_5386763 crossref_primary_10_3233_IDT_230238 crossref_primary_10_1016_j_cose_2023_103650 crossref_primary_10_1016_j_iot_2023_100715 crossref_primary_10_1007_s11831_021_09668_6 crossref_primary_10_3390_s23010321 crossref_primary_10_1109_JIOT_2020_3048439 crossref_primary_10_1007_s10586_024_04509_0 crossref_primary_10_1007_s10207_024_00891_3 crossref_primary_10_3390_fi16030073 crossref_primary_10_1016_j_comcom_2025_108055 crossref_primary_10_3233_JCM_247183 crossref_primary_10_32604_iasc_2023_039255 crossref_primary_10_1007_s11227_024_05993_2 crossref_primary_10_1016_j_adhoc_2024_103698 crossref_primary_10_1177_18724981241291422 crossref_primary_10_3390_s22165986 crossref_primary_10_1007_s10586_025_05234_y crossref_primary_10_1088_1742_6596_2414_1_012014 crossref_primary_10_1016_j_eswa_2023_122380 crossref_primary_10_3390_electronics14010104 crossref_primary_10_32604_cmc_2024_053721 crossref_primary_10_1007_s43926_025_00099_4 crossref_primary_10_24018_ejeng_2025_10_2_3249 crossref_primary_10_1109_TCE_2023_3329151 crossref_primary_10_1016_j_measen_2024_101263 crossref_primary_10_3390_fi16070255 crossref_primary_10_32604_cmc_2024_059271 crossref_primary_10_7717_peerj_cs_721 crossref_primary_10_1371_journal_pone_0281323 crossref_primary_10_1007_s10207_025_01016_0 crossref_primary_10_1007_s13042_022_01758_6 crossref_primary_10_1016_j_ins_2023_119783 crossref_primary_10_1016_j_iot_2023_100999 crossref_primary_10_3389_fdata_2023_1081466 crossref_primary_10_3390_a16020075 crossref_primary_10_1007_s10462_024_10776_5 crossref_primary_10_3390_fi16100368 crossref_primary_10_1109_TAFFC_2022_3206891 crossref_primary_10_3390_s24154766 crossref_primary_10_1109_ACCESS_2024_3437214 crossref_primary_10_1109_ACCESS_2024_3460468 crossref_primary_10_1002_cpe_7552 crossref_primary_10_1016_j_knosys_2023_110941 crossref_primary_10_1155_2021_1723535 crossref_primary_10_3390_bdcc6040137 crossref_primary_10_3390_electronics12153283 crossref_primary_10_1038_s41598_024_78976_1 crossref_primary_10_1016_j_adhoc_2021_102685 crossref_primary_10_1186_s42400_023_00199_0 crossref_primary_10_3390_s22197409 crossref_primary_10_1016_j_asoc_2024_111378 crossref_primary_10_1038_s41598_025_03498_3 crossref_primary_10_3390_electronics11030422 crossref_primary_10_1109_JIOT_2022_3224649 |
| Cites_doi | 10.1109/MGRS.2016.2540798 10.1109/PCCC.2017.8280489 10.1007/978-3-319-21542-6_4 10.1147/JRD.2017.2708299 10.1049/iet-ifs.2014.0099 10.1109/ACCESS.2018.2793966 10.1007/s11749-016-0481-7 10.1016/j.proeng.2012.01.849 10.1109/ARGENCON.2016.7585247 10.1145/2542049 10.1007/978-3-642-35289-8_32 10.5220/0006639801080116 10.1016/j.neucom.2012.11.050 10.1016/j.rser.2015.10.036 10.1145/2508859.2512494 10.1109/ICCUBEA.2015.61 10.1109/ACCESS.2017.2747560 10.1109/CSE-EUC.2017.118 10.1016/j.procs.2018.07.183 10.1002/sec.681 10.4018/978-1-5225-0105-3 10.1016/j.comcom.2014.09.008 10.1016/j.adhoc.2015.07.013 10.1109/ICEICT.2016.7879701 10.1109/COMST.2016.2627399 10.1109/ICBDACI.2017.8070818 10.1145/3029806.3029823 10.1109/ICNC.2011.6022060 10.1016/j.jnca.2014.11.011 10.1109/MNET.2018.1700202 10.1007/s10916-018-1045-z 10.1109/GLOCOM.2017.8254027 10.1016/j.asoc.2018.06.017 10.1016/j.asoc.2008.06.001 10.1109/COMST.2015.2444095 10.3233/IDA-173493 10.1016/j.future.2018.03.007 10.1109/MPRV.2018.03367731 10.1109/RAIT.2016.7507884 10.1109/ICEMIS.2016.7745295 10.1145/3054925 10.1007/s11276-016-1439-0 10.1609/aaai.v29i1.9513 10.1145/2381716.2381867 10.1109/ICCIC.2013.6724156 10.3390/s130506492 10.1016/j.procs.2016.02.095 10.1142/9789813143180_0009 10.1109/CISS.2019.8693059 10.1201/9781315139470 10.1155/2013/794326 10.1155/2019/7045862 10.1007/s13389-014-0089-3 10.1109/ACCESS.2019.2903723 10.1109/WD.2011.6098218 10.1016/j.procs.2020.03.330 10.1109/MS.2017.26 10.4249/scholarpedia.5947 10.1109/COMST.2017.2707140 10.1016/j.procs.2013.09.019 10.1007/978-1-4899-7488-4_293 10.3390/s141224188 10.1109/GLOBECOM38437.2019.9014102 10.1109/ACCESS.2018.2841987 10.1109/JPROC.2017.2761740 10.3390/info7020025 10.1504/IJSSC.2015.070953 10.1016/j.bjp.2013.12.020 10.1145/3266444.3266452 10.1109/CCWC.2019.8666588 10.1109/TNNLS.2015.2404803 10.1109/iThings/CPSCom.2011.84 10.1007/978-1-4899-7641-3_9 10.1145/3321408.3321588 10.1016/j.knosys.2016.08.020 10.1109/SECON.2016.7506774 10.1109/PCCC.2015.7410342 10.1109/ICMSAO.2015.7152200 10.1016/j.jal.2016.11.018 10.1109/ICFHR.2016.0052 10.1007/978-94-007-7262-5_137 10.1109/ICTS.2017.8265667 10.1016/j.asoc.2015.10.011 10.1109/MCI.2015.2471235 10.1007/978-3-319-49445-6_1 10.1016/j.jksus.2017.05.013 10.1016/j.jnca.2016.08.012 10.1109/COMST.2018.2844341 10.1007/s10462-017-9567-1 10.17487/rfc7252 10.1016/j.jocs.2017.03.006 10.1109/CVPR.2009.5206848 10.3390/s19040974 10.1007/s11277-011-0288-5 10.1007/978-3-319-47075-7_52 10.1016/j.eswa.2013.08.066 10.1126/science.aaa8415 10.1016/j.eswa.2018.03.056 10.1109/CNS.2014.6997469 10.3390/electronics6010005 10.4236/jcc.2017.51010 10.1016/j.chaos.2018.03.010 10.1016/j.adhoc.2012.02.016 10.1016/j.eswa.2014.08.002 10.1109/IBCAST.2014.6778179 10.1109/ICCV.2017.115 10.1145/382912.382923 10.1109/INM.2015.7140344 10.1109/ICC.2014.6883583 10.1109/MCOM.2016.7514162 10.1109/IACS.2018.8355434 10.3390/app7101072 10.1109/ISCC.2015.7405513 10.1016/j.future.2016.12.040 10.1016/j.swevo.2019.100631 10.1109/CMC.2009.172 10.1109/IDAACS.2017.8095118 10.1007/978-3-642-15825-4_10 10.1016/j.jcss.2013.06.016 10.1007/s11227-018-2413-7 10.1016/j.adhoc.2013.04.014 10.1145/2851486 10.1109/WiMOB.2013.6673419 10.1016/j.comnet.2014.11.008 10.1007/978-3-319-21476-4_2 10.1016/j.neunet.2014.09.003 10.1016/j.future.2017.08.043 10.1109/IJCNN.2017.7966342 10.1016/j.procs.2016.06.047 10.1109/ICEDSA.2016.7818534 10.1145/2971648.2971670 10.1109/COMST.2015.2494502 10.14569/IJACSA.2015.060316 10.1007/s12053-016-9476-1 10.1016/j.neucom.2014.08.081 10.1109/MCOM.2015.7263375 10.1109/SPW.2018.00013 10.1007/978-3-642-04492-2_66 10.1109/TCYB.2016.2536638 10.1109/CCNC.2016.7444797 10.1109/ACCESS.2019.2913895 10.1109/CNS.2014.6997468 10.1016/j.inffus.2017.10.006 10.1109/WiCOM.2012.6478720 |
| ContentType | Journal Article |
| Copyright | CIMNE, Barcelona, Spain 2020 CIMNE, Barcelona, Spain 2020. |
| Copyright_xml | – notice: CIMNE, Barcelona, Spain 2020 – notice: CIMNE, Barcelona, Spain 2020. |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.1007/s11831-020-09496-0 |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences Engineering |
| EISSN | 1886-1784 |
| EndPage | 3243 |
| ExternalDocumentID | 10_1007_s11831_020_09496_0 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C -~X .4S .86 .DC .VR 06D 0R~ 0VY 1N0 1SB 203 23M 28- 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 3V. 4.4 406 408 40D 40E 5GY 5VS 67Z 6NX 7WY 8FE 8FG 8FL 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABDZT ABECU ABFTV ABHQN ABJCF ABJNI ABJOX ABKCH ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ CAG CCPQU COF CS3 CSCUP DDRTE DNIVK DPUIP DWQXO EBLON EBS EDO EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GROUPED_ABI_INFORM_COMPLETE H13 HCIFZ HF~ HG5 HG6 HMJXF HRMNR HVGLF HZ~ I-F IJ- IKXTQ IWAJR IXC IXD IXE IZQ I~X I~Z J-C J0Z JBSCW K60 K6V K6~ K7- KDC KOV L6V LLZTM M0C M0N M4Y M7S MA- MK~ N2Q NB0 NDZJH NF0 NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P2P P62 P9P PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 PTHSS QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W48 WK8 YLTOR Z45 Z5O Z7R Z7X Z7Y Z7Z Z83 Z88 ZMTXR _50 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION JZLTJ PHGZM PHGZT PQGLB JQ2 |
| ID | FETCH-LOGICAL-c319t-1b6a59310674cfde6f3d01d70a2bb5d7b2bceeb46a680e2d6cae16c225ede5113 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 198 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000580462300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1134-3060 |
| IngestDate | Wed Sep 17 23:56:17 EDT 2025 Sat Nov 29 06:21:46 EST 2025 Tue Nov 18 21:57:22 EST 2025 Fri Feb 21 02:49:24 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-1b6a59310674cfde6f3d01d70a2bb5d7b2bceeb46a680e2d6cae16c225ede5113 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-1794-8300 |
| PQID | 2532600320 |
| PQPubID | 1486352 |
| PageCount | 33 |
| ParticipantIDs | proquest_journals_2532600320 crossref_primary_10_1007_s11831_020_09496_0 crossref_citationtrail_10_1007_s11831_020_09496_0 springer_journals_10_1007_s11831_020_09496_0 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-06-01 |
| PublicationDateYYYYMMDD | 2021-06-01 |
| PublicationDate_xml | – month: 06 year: 2021 text: 2021-06-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Dordrecht |
| PublicationPlace_xml | – name: Dordrecht |
| PublicationSubtitle | State of the Art Reviews |
| PublicationTitle | Archives of computational methods in engineering |
| PublicationTitleAbbrev | Arch Computat Methods Eng |
| PublicationYear | 2021 |
| Publisher | Springer Netherlands Springer Nature B.V |
| Publisher_xml | – name: Springer Netherlands – name: Springer Nature B.V |
| References | Ham, Kim, Kim, Choi (CR83) 2014; 56 Taivalsaari, Mikkonen (CR186) 2017; 34 Ashraf, Habaebi (CR190) 2015; 49 Mitchell, Chen (CR49) 2014; 46 Lavrova, Pechenkin (CR193) 2015; 7 CR162 Ożadowicz, Grela (CR8) 2017; 10 McHugh (CR188) 2000; 3 Ratner (CR79) 2017 Lee, Bae, Kim (CR21) 2017; 7 CR157 CR158 CR156 Le, Loo, Chai, Aiash (CR41) 2016; 7 Tajbakhsh, Rahmati, Mirzaei (CR115) 2009; 9 Shafiei, Khonsari, Derakhshi, Mousavi (CR58) 2014; 80 Al-Jumeily, Hussain, Fergus (CR150) 2015; 5 CR173 CR174 Farnaaz, Jabbar (CR107) 2016; 89 CR170 Ozay, Esnaola, Vural, Kulkarni, Poor (CR85) 2015; 27 Alhajri, Zagrouba, Al-Haidari (CR161) 2019; 14 Sanchez, Muñoz, Galache, Sotres, Santana, Gutierrez, Ramdhany, Gluhak, Krco, Theodoridis (CR192) 2014; 61 CR166 CR165 Colak, Sagiroglu, Fulli, Yesilbudak, Covrig (CR19) 2016; 54 Liu, Pi (CR80) 2017; 11 Gomes, Barddal, Enembreck, Bifet (CR118) 2017; 50 Zhang, Yang, Chen, Li (CR169) 2018; 42 CR141 Bosman, Iacca, Tejada, Wörtche, Liotta (CR125) 2015; 35 CR137 CR138 CR135 CR136 Ahmad, Basheri, Iqbal, Rahim (CR108) 2018; 6 Kumar, Mangathayaru, Narsimha (CR99) 2017; 12 CR139 Huda, Yearwood, Hassan, Almogren (CR172) 2018; 71 Aziz, Sanaa, Hassanien (CR89) 2017; 24 Mohammadi, Al-Fuqaha, Sorour, Guizani (CR159) 2018; 20 Resende, Drummond (CR103) 2018; 51 Emmanuel, Rayudu (CR18) 2016; 74 Mehmood, Mukherjee, Ahmed, Song, Malik (CR92) 2018; 74 CR152 Li, Ota, Dong (CR132) 2018; 32 CR148 CR146 CR147 CR144 CR142 CR143 Ashraf, Ahmad, Ashraf (CR91) 2018; 2 Song, Ying (CR71) 2015; 27 Elejoste, Angulo, Perallos, Chertudi, Zuazola, Moreno, Azpilicueta, Astrain, Falcone, Villadangos (CR9) 2013; 13 Al-Fuqaha, Khreishah, Guizani, Rayes, Mohammadi (CR11) 2015; 53 Du, Xiong, Wu, Zhang, Zhang, Tao (CR160) 2016; 47 Jadhav, Channe (CR88) 2016; 5 CR116 CR111 Hussain, Kalita (CR113) 2015; 9 CR110 Genkin, Pachmanov, Pipman, Shamir, Tromer (CR61) 2016; 59 Gómez, Huete, Hoyos, Perez, Grigori (CR27) 2013; 21 Wallgren, Raza, Voigt (CR38) 2013; 9 Nweke, Teh, Al-Garadi, Alo (CR151) 2018; 105 CR117 Sze, Chen, Yang, Emer (CR134) 2017; 105 Fiore, Palmieri, Castiglione, De Santis (CR167) 2013; 122 Miorandi, Sicari, De Pellegrini, Chlamtac (CR1) 2012; 10 Sicari, Rizzardi, Grieco, Coen-Porisini (CR5) 2015; 76 CR130 CR126 CR123 CR120 Kandah, Singh, Zhang, Wang (CR56) 2013; 6 CR121 Muhammad, Anjum, Mazhar (CR57) 2015; 111 Feng, Cho, Pedrycz, Fujita, Herawan (CR112) 2016; 111 CR129 Thakkar, Lohiya (CR185) 2020; 167 CR17 CR15 CR14 CR13 Lerman, Bontempi, Markowitch (CR86) 2015; 5 CR10 Biau, Scornet (CR104) 2016; 25 Yerima, Sezer, Muttik (CR124) 2015; 9 Hussein, Khalid (CR12) 2016; 14 Al-Fuqaha, Guizani, Mohammadi, Aledhari, Ayyash (CR24) 2015; 17 Gunupudi, Nimmala, Gugulothu, Gali (CR100) 2017; 74 CR29 Selvi, Shashidara (CR102) 2016; 5 Cintuglu, Mohammed, Akkaya, Uluagac (CR20) 2016; 19 CR26 Schmidhuber (CR65) 2015; 61 CR25 Li, Zhang, Peng, Yang (CR95) 2018; 110 CR22 CR101 CR109 Bandyopadhyay, Sen (CR28) 2011; 58 CR39 CR37 CR36 CR35 CR34 CR33 CR32 Breiman (CR69) 2017 Serpen, Aghaei (CR96) 2018; 22 HaddadPajouh, Dehghantanha, Khayami, Choo (CR153) 2018; 85 Zhang, Li, Wang (CR171) 2019; 7 Oh, Kim, Ro (CR31) 2014; 14 Aburomman, Reaz (CR122) 2016; 38 Jordan, Mitchell (CR62) 2015; 349 CR48 CR47 CR46 CR45 CR44 CR43 Hinton (CR168) 2009; 4 Meddeb (CR23) 2016; 54 CR40 Arora, Varshney (CR127) 2016; 78 Chhaya, Sharma, Bhagwatikar, Kumar (CR16) 2017; 6 Muniyandi, Rajeswari, Rajaram (CR128) 2012; 30 Buczak, Guven (CR105) 2015; 18 CR55 CR53 CR52 CR51 CR50 Zhang, Zhang, Du (CR140) 2016; 4 Fadlullah, Tang, Mao, Kato, Akashi, Inoue, Mizutani (CR133) 2017; 19 Pongle, Chavan (CR42) 2015; 121 CR67 CR66 CR64 CR60 Shakeel, Baskar, Dhulipala, Mishra, Jaber (CR184) 2018; 42 Xiao, Biggio, Nelson, Xiao, Eckert, Roli (CR78) 2015; 160 Tolosana, Vera-Rodriguez, Fierrez, Ortega-Garcia (CR145) 2018; 6 Diro, Chilamkurti (CR155) 2018; 82 Leloglu (CR59) 2016; 5 Borgia (CR3) 2014; 54 Ren, Zhang, Suganthan (CR119) 2016; 11 Brun, Yin, Gelenbe (CR154) 2018; 134 CR77 CR76 CR75 CR74 Saleh, Talaat, Labib (CR97) 2019; 51 CR72 Xie, Huang, Bai, Hu (CR131) 2017; 10 Li, Ma, Jiao (CR163) 2015; 9 CR2 CR4 Gupta, Rawat, Jain, Arora, Dhami (CR70) 2017; 163 Elhag, Fernández, Bawakid, Alshomrani, Herrera (CR114) 2015; 42 CR6 Raza, Wallgren, Voigt (CR30) 2013; 11 CR7 CR87 Meidan, Bohadana, Mathov, Mirsky, Shabtai, Breitenbacher, Elovici (CR164) 2018; 17 Shams, Rizaner (CR81) 2018; 24 Kim, Lee, Kim (CR73) 2014; 41 Liu, Du, Zhang, Zhu, Wang, Guizani (CR84) 2019; 19 Sutton, Barto (CR68) 2018 Aljawarneh, Aldwairi, Yassein (CR90) 2018; 25 CR182 CR180 CR181 Uke, Mahajan, Thool (CR54) 2013; 70 CR98 CR179 CR177 Codella, Nguyen, Pankanti, Gutman, Helba, Halpern, Smith (CR183) 2017; 61 CR94 CR178 CR93 CR175 CR176 Hasan, Nasser, Ahmad, Molla (CR106) 2016; 7 Thaseen, Kumar (CR82) 2017; 29 Goodfellow, Bengio, Courville (CR63) 2016 CR194 CR191 CR189 Lopez-Martin, Carro, Sanchez-Esguevillas, Lloret (CR149) 2017; 5 CR187 L Breiman (9496_CR69) 2017 R Tolosana (9496_CR145) 2018; 6 G Serpen (9496_CR96) 2018; 22 9496_CR129 9496_CR53 9496_CR55 9496_CR2 9496_CR50 9496_CR4 9496_CR52 9496_CR51 V Sze (9496_CR134) 2017; 105 ASA Aziz (9496_CR89) 2017; 24 S Elhag (9496_CR114) 2015; 42 9496_CR136 9496_CR137 9496_CR135 9496_CR130 9496_CR47 9496_CR46 M Mohammadi (9496_CR159) 2018; 20 9496_CR116 9496_CR48 9496_CR117 9496_CR43 9496_CR45 L Sanchez (9496_CR192) 2014; 61 9496_CR44 9496_CR40 9496_CR6 9496_CR7 PM Shakeel (9496_CR184) 2018; 42 J Gómez (9496_CR27) 2013; 21 D Oh (9496_CR31) 2014; 14 P Elejoste (9496_CR9) 2013; 13 9496_CR126 9496_CR123 9496_CR121 9496_CR120 9496_CR109 ZM Fadlullah (9496_CR133) 2017; 19 9496_CR76 9496_CR75 9496_CR77 9496_CR72 9496_CR74 H Xiao (9496_CR78) 2015; 160 H HaddadPajouh (9496_CR153) 2018; 85 N Ashraf (9496_CR91) 2018; 2 M Ozay (9496_CR85) 2015; 27 9496_CR110 9496_CR111 E Selvi (9496_CR102) 2016; 5 Q Zhang (9496_CR169) 2018; 42 9496_CR64 MI Jordan (9496_CR62) 2015; 349 9496_CR67 9496_CR66 Y Liu (9496_CR80) 2017; 11 E Borgia (9496_CR3) 2014; 54 9496_CR60 D Lavrova (9496_CR193) 2015; 7 9496_CR101 9496_CR17 I Ahmad (9496_CR108) 2018; 6 A Le (9496_CR41) 2016; 7 9496_CR14 9496_CR13 9496_CR15 9496_CR10 RS Sutton (9496_CR68) 2018 AP Muniyandi (9496_CR128) 2012; 30 GE Hinton (9496_CR168) 2009; 4 YY Song (9496_CR71) 2015; 27 J Hussain (9496_CR113) 2015; 9 H Li (9496_CR132) 2018; 32 I Goodfellow (9496_CR63) 2016 GR Kumar (9496_CR99) 2017; 12 P Pongle (9496_CR42) 2015; 121 L Li (9496_CR95) 2018; 110 NC Codella (9496_CR183) 2017; 61 HM Gomes (9496_CR118) 2017; 50 9496_CR39 9496_CR36 9496_CR35 9496_CR37 9496_CR32 9496_CR34 9496_CR33 D Miorandi (9496_CR1) 2012; 10 Y Ren (9496_CR119) 2016; 11 R Mitchell (9496_CR49) 2014; 46 SD Jadhav (9496_CR88) 2016; 5 AL Buczak (9496_CR105) 2015; 18 S Uke (9496_CR54) 2013; 70 9496_CR29 9496_CR25 9496_CR26 J Schmidhuber (9496_CR65) 2015; 61 9496_CR22 J McHugh (9496_CR188) 2000; 3 AA Aburomman (9496_CR122) 2016; 38 A Ożadowicz (9496_CR8) 2017; 10 D Genkin (9496_CR61) 2016; 59 MAM Hasan (9496_CR106) 2016; 7 L Chhaya (9496_CR16) 2017; 6 S Sicari (9496_CR5) 2015; 76 G Kim (9496_CR73) 2014; 41 NH Hussein (9496_CR12) 2016; 14 MH Cintuglu (9496_CR20) 2016; 19 A Al-Fuqaha (9496_CR24) 2015; 17 B Gupta (9496_CR70) 2017; 163 RK Gunupudi (9496_CR100) 2017; 74 I Colak (9496_CR19) 2016; 54 X Liu (9496_CR84) 2019; 19 M Emmanuel (9496_CR18) 2016; 74 9496_CR194 S Raza (9496_CR30) 2013; 11 9496_CR191 HH Bosman (9496_CR125) 2015; 35 Y Meidan (9496_CR164) 2018; 17 A Taivalsaari (9496_CR186) 2017; 34 IS Thaseen (9496_CR82) 2017; 29 L Zhang (9496_CR140) 2016; 4 MF Muhammad (9496_CR57) 2015; 111 9496_CR181 9496_CR182 9496_CR180 Y Zhang (9496_CR171) 2019; 7 A Tajbakhsh (9496_CR115) 2009; 9 9496_CR189 9496_CR187 L Wallgren (9496_CR38) 2013; 9 QM Ashraf (9496_CR190) 2015; 49 9496_CR98 A Thakkar (9496_CR185) 2020; 167 F Kandah (9496_CR56) 2013; 6 9496_CR94 9496_CR93 A Mehmood (9496_CR92) 2018; 74 B Ratner (9496_CR79) 2017 9496_CR173 9496_CR170 D Bandyopadhyay (9496_CR28) 2011; 58 HS Ham (9496_CR83) 2014; 56 O Brun (9496_CR154) 2018; 134 9496_CR178 HF Nweke (9496_CR151) 2018; 105 9496_CR179 9496_CR176 9496_CR177 PAA Resende (9496_CR103) 2018; 51 9496_CR174 EA Shams (9496_CR81) 2018; 24 9496_CR175 9496_CR87 H Shafiei (9496_CR58) 2014; 80 A Meddeb (9496_CR23) 2016; 54 R Alhajri (9496_CR161) 2019; 14 A Al-Fuqaha (9496_CR11) 2015; 53 9496_CR162 P Arora (9496_CR127) 2016; 78 SY Yerima (9496_CR124) 2015; 9 D Al-Jumeily (9496_CR150) 2015; 5 9496_CR165 E Leloglu (9496_CR59) 2016; 5 M Xie (9496_CR131) 2017; 10 9496_CR166 B Du (9496_CR160) 2016; 47 N Farnaaz (9496_CR107) 2016; 89 S Aljawarneh (9496_CR90) 2018; 25 M Lopez-Martin (9496_CR149) 2017; 5 9496_CR158 AI Saleh (9496_CR97) 2019; 51 9496_CR156 9496_CR157 L Lerman (9496_CR86) 2015; 5 F Feng (9496_CR112) 2016; 111 9496_CR152 U Fiore (9496_CR167) 2013; 122 G Biau (9496_CR104) 2016; 25 S Lee (9496_CR21) 2017; 7 9496_CR138 9496_CR139 S Huda (9496_CR172) 2018; 71 Y Li (9496_CR163) 2015; 9 9496_CR147 9496_CR148 9496_CR146 9496_CR143 9496_CR144 9496_CR141 9496_CR142 AA Diro (9496_CR155) 2018; 82 |
| References_xml | – ident: CR45 – ident: CR22 – ident: CR173 – volume: 163 start-page: 15 issue: 8 year: 2017 ident: CR70 article-title: Analysis of various decision tree algorithms for classification in data mining publication-title: Int J Comput Appl – ident: CR74 – ident: CR39 – volume: 6 start-page: 539 issue: 4 year: 2013 ident: CR56 article-title: Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks publication-title: Secur Commun Netw – ident: CR51 – ident: CR138 – volume: 38 start-page: 360 year: 2016 ident: CR122 article-title: A novel SVM-kNN-PSO ensemble method for intrusion detection system publication-title: Appl Soft Comput – ident: CR121 – volume: 46 start-page: 55 issue: 4 year: 2014 ident: CR49 article-title: A survey of intrusion detection techniques for cyber-physical systems publication-title: ACM Comput Surv – ident: CR144 – volume: 32 start-page: 96 issue: 1 year: 2018 ident: CR132 article-title: Learning IoT in edge: Deep learning for the Internet of Things with edge computing publication-title: IEEE Netw – volume: 34 start-page: 72 issue: 1 year: 2017 ident: CR186 article-title: A roadmap to the programmable world: software challenges in the IoT era publication-title: IEEE Softw – year: 2017 ident: CR69 publication-title: Classification and regression trees – ident: CR178 – ident: CR191 – volume: 78 start-page: 507 year: 2016 ident: CR127 article-title: Analysis of k-means and k-medoids algorithm for big data publication-title: Procedia Comput Sci – volume: 9 start-page: 105 issue: 3 year: 2015 ident: CR113 article-title: Understanding network intrusion detection system using OLAP on NSL-KDD dataset publication-title: IUP J Comput Sci – volume: 24 start-page: 109 year: 2017 ident: CR89 article-title: Comparison of classification techniques applied for network intrusion detection and classification publication-title: J Appl Logic – volume: 18 start-page: 1153 issue: 2 year: 2015 ident: CR105 article-title: A survey of data mining and machine learning methods for cyber security intrusion detection publication-title: IEEE Commun Surv Tutor – volume: 14 start-page: 2417 issue: 10 year: 2019 ident: CR161 article-title: Survey for anomaly detection of IoT botnets using machine learning auto-encoders publication-title: Int J Appl Eng Res – volume: 121 start-page: 6989 issue: 9 year: 2015 ident: CR42 article-title: Real time intrusion and wormhole attack detection in IOT publication-title: Int J Comput Appl – ident: CR109 – ident: CR126 – volume: 41 start-page: 1690 issue: 4 year: 2014 ident: CR73 article-title: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection publication-title: Expert Syst Appl – ident: CR156 – ident: CR179 – volume: 27 start-page: 1773 issue: 8 year: 2015 ident: CR85 article-title: Machine learning methods for attack detection in the smart grid publication-title: IEEE Trans Neural Netw Learn Syst – ident: CR10 – ident: CR33 – ident: CR137 – volume: 42 start-page: 146 year: 2018 ident: CR169 article-title: A survey on deep learning for big data publication-title: Inf Fusion – ident: CR6 – volume: 9 start-page: 313 issue: 6 year: 2015 ident: CR124 article-title: High accuracy android malware detection using ensemble learning publication-title: IET Inf Secur – year: 2017 ident: CR79 publication-title: Statistical and machine-learning data mining: techniques for better predictive modeling and analysis of big data – ident: CR44 – volume: 5 start-page: 121 issue: 01 year: 2016 ident: CR59 article-title: A review of security concerns in Internet of Things publication-title: J Comput Commun – volume: 51 start-page: 48 issue: 3 year: 2018 ident: CR103 article-title: A survey of random forest based methods for intrusion detection systems publication-title: ACM Comput Surv – volume: 19 start-page: 446 issue: 1 year: 2016 ident: CR20 article-title: A survey on smart grid cyber-physical system testbeds publication-title: IEEE Commun Surv Tutor – ident: CR52 – ident: CR139 – ident: CR162 – volume: 5 start-page: 18042 year: 2017 ident: CR149 article-title: Network traffic classifier with convolutional and recurrent neural networks for Internet of Things publication-title: IEEE Access – volume: 3 start-page: 262 issue: 4 year: 2000 ident: CR188 article-title: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory publication-title: ACM Trans Inf Syst Secur – volume: 42 start-page: 193 issue: 1 year: 2015 ident: CR114 article-title: On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems publication-title: Expert Syst Appl – ident: CR120 – volume: 134 start-page: 458 year: 2018 ident: CR154 article-title: Deep learning with dense random neural network for detecting attacks against iot-connected home environments publication-title: Procedia Comput Sci – volume: 7 start-page: 1072 issue: 10 year: 2017 ident: CR21 article-title: Future of IoT networks: a survey publication-title: Appl Sci – ident: CR148 – ident: CR177 – ident: CR93 – ident: CR87 – volume: 85 start-page: 88 year: 2018 ident: CR153 article-title: A deep recurrent neural network based approach for Internet of Things malware threat hunting publication-title: Fut Gener Comput Syst – volume: 11 start-page: 8 year: 2017 ident: CR80 publication-title: KSII Trans Internet Inf Syst – ident: CR111 – volume: 9 start-page: 205 issue: 5 year: 2015 ident: CR163 article-title: A hybrid malicious code detection method based on deep learning publication-title: Int J Secur Appl – volume: 24 start-page: 1821 issue: 5 year: 2018 ident: CR81 article-title: A novel support vector machine based intrusion detection system for mobile ad hoc networks publication-title: Wireless Netw – year: 2016 ident: CR63 publication-title: Deep learning – volume: 61 start-page: 5 issue: 4/5 year: 2017 ident: CR183 article-title: Deep learning ensembles for melanoma recognition in dermoscopy images publication-title: IBM J Res Dev – ident: CR75 – volume: 50 start-page: 23 issue: 2 year: 2017 ident: CR118 article-title: A survey on ensemble learning for data stream classification publication-title: ACM Comput Surv – ident: CR15 – volume: 58 start-page: 49 issue: 1 year: 2011 ident: CR28 article-title: Internet of things: applications and challenges in technology and standardization publication-title: Wireless Pers Commun – volume: 5 start-page: 129 issue: 3 year: 2015 ident: CR150 article-title: Using adaptive neural networks to provide self-healing autonomic software publication-title: Int J Space-Based Situated Comput – ident: CR116 – ident: CR32 – ident: CR189 – volume: 14 start-page: 52 issue: 1 year: 2016 ident: CR12 article-title: A survey of cloud computing security challenges and solutions publication-title: Int J Comput Sci Inf Secur – volume: 70 start-page: 1099 issue: 11 year: 2013 ident: CR54 article-title: UML modeling of physical and data link layer security attacks in WSN publication-title: Int J Comput Appl – ident: CR64 – volume: 6 start-page: 33789 year: 2018 ident: CR108 article-title: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection publication-title: IEEE Access – ident: CR26 – volume: 14 start-page: 24188 issue: 12 year: 2014 ident: CR31 article-title: A malicious pattern detection engine for embedded security systems in the Internet of Things publication-title: Sensors – volume: 47 start-page: 1017 issue: 4 year: 2016 ident: CR160 article-title: Stacked convolutional denoising auto-encoders for feature representation publication-title: IEEE Trans Cybern – ident: CR143 – volume: 20 start-page: 2923 issue: 4 year: 2018 ident: CR159 article-title: Deep learning for IoT big data and streaming analytics: a survey publication-title: IEEE Commun Surv Tutor – ident: CR43 – volume: 74 start-page: 133 year: 2016 ident: CR18 article-title: Communication technologies for smart grid applications: a survey publication-title: J Netw Comput Appl – ident: CR14 – ident: CR2 – ident: CR37 – ident: CR53 – volume: 10 start-page: 83 year: 2017 ident: CR131 article-title: The anonymization protection algorithm based on fuzzy clustering for the ego of data in the internet of things publication-title: J Electr Comput Eng – ident: CR194 – volume: 5 start-page: 150 issue: 3 year: 2016 ident: CR102 article-title: Enhanced packet dropping algorithm and neighbour node cluster strategy for intrusion detection in MANET publication-title: Int J Comput – ident: CR98 – volume: 30 start-page: 174 year: 2012 ident: CR128 article-title: Network anomaly detection by cascading k-Means clustering and C4.5 decision tree algorithm publication-title: Procedia Eng. – volume: 89 start-page: 213 year: 2016 ident: CR107 article-title: Random forest modeling for network intrusion detection system publication-title: Procedia Comput Sci – volume: 27 start-page: 130 issue: 2 year: 2015 ident: CR71 article-title: Decision tree methods: applications for classification and prediction publication-title: Shanghai Archiv Psychiatry – ident: CR48 – ident: CR110 – ident: CR7 – ident: CR76 – volume: 105 start-page: 233 year: 2018 ident: CR151 article-title: Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: state of the art and research challenges publication-title: Expert Syst Appl – volume: 10 start-page: 1497 issue: 7 year: 2012 ident: CR1 article-title: Internet of things: vision, applications and research challenges publication-title: Ad Hoc Netw – ident: CR166 – volume: 74 start-page: 5156 issue: 10 year: 2018 ident: CR92 article-title: NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks publication-title: J Supercomput – volume: 6 start-page: 5128 year: 2018 ident: CR145 article-title: Exploring recurrent neural networks for on-line handwritten signature biometrics publication-title: IEEE Access – volume: 12 start-page: 65 issue: 1 year: 2017 ident: CR99 article-title: A feature clustering based dimensionality reduction for intrusion detection publication-title: IADIS Int J Comput Sci Inf Syst – volume: 54 start-page: 40 issue: 7 year: 2016 ident: CR23 article-title: Internet of things standards: who stands out from the crowd? publication-title: IEEE Commun Mag – volume: 82 start-page: 761 year: 2018 ident: CR155 article-title: Distributed attack detection scheme using deep learning approach for Internet of Things publication-title: Fut Gener Comput Syst – ident: CR158 – ident: CR135 – ident: CR77 – ident: CR25 – ident: CR182 – ident: CR129 – ident: CR101 – volume: 17 start-page: 12 issue: 3 year: 2018 ident: CR164 article-title: N-BaIoT-Network-based detection of IoT botnet attacks using deep autoencoders publication-title: IEEE Pervasive Comput – volume: 71 start-page: 66 year: 2018 ident: CR172 article-title: Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks publication-title: Appl Soft Comput – volume: 5 start-page: 123 issue: 2 year: 2015 ident: CR86 article-title: A machine learning approach against a masked AES publication-title: J Cryptogr Eng – volume: 29 start-page: 462 issue: 4 year: 2017 ident: CR82 article-title: Intrusion detection model using fusion of chi-square feature selection and multi class SVM publication-title: J King Saud Univ Comput Inf Sci – ident: CR170 – ident: CR60 – ident: CR36 – volume: 59 start-page: 70 issue: 6 year: 2016 ident: CR61 article-title: Physical key extraction attacks on PCs publication-title: Commun ACM – volume: 49 start-page: 112 year: 2015 ident: CR190 article-title: Autonomic schemes for threat mitigation in Internet of Things publication-title: J Netw Comput Appl – volume: 10 start-page: 563 issue: 3 year: 2017 ident: CR8 article-title: Energy saving in the street lighting control system-a new approach based on the EN-15232 standard publication-title: Energ Effi – ident: CR147 – volume: 54 start-page: 396 year: 2016 ident: CR19 article-title: A survey on the critical issues in smart grid technologies publication-title: Renew Sustain Energy Rev – volume: 4 start-page: 22 issue: 2 year: 2016 ident: CR140 article-title: Deep learning for remote sensing data: a technical tutorial on the state of the art publication-title: IEEE Geosci Remote Sens Mag – volume: 80 start-page: 644 issue: 3 year: 2014 ident: CR58 article-title: Detection and mitigation of sinkhole attacks in wireless sensor networks publication-title: J Comput Syst Sci – volume: 42 start-page: 186 issue: 10 year: 2018 ident: CR184 article-title: Maintaining security and privacy in health care system using learning based deep-Q-networks publication-title: J Med Syst – ident: CR66 – ident: CR47 – ident: CR72 – volume: 5 start-page: 1842 issue: 1 year: 2016 ident: CR88 article-title: Comparative study of K-NN, naive Bayes and decision tree classification techniques publication-title: Int J Sci Res – ident: CR117 – volume: 7 start-page: 25 issue: 2 year: 2016 ident: CR41 article-title: A specification-based IDS for detecting attacks on RPL-based network topology publication-title: Information – volume: 11 start-page: 41 issue: 1 year: 2016 ident: CR119 article-title: Ensemble classification and regression-recent developments, applications and future directions publication-title: IEEE Comput Intell Mag – volume: 105 start-page: 2295 issue: 12 year: 2017 ident: CR134 article-title: Efficient processing of deep neural networks: a tutorial and survey publication-title: Proc IEEE – volume: 22 start-page: 1101 issue: 5 year: 2018 ident: CR96 article-title: Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms publication-title: Intell Data Anal – volume: 76 start-page: 146 year: 2015 ident: CR5 article-title: Security, privacy and trust in Internet of Things: the road ahead publication-title: Comput Netw – ident: CR165 – ident: CR123 – volume: 7 start-page: 31711 year: 2019 ident: CR171 article-title: Intrusion detection for IoT based on improved genetic algorithm and deep belief network publication-title: IEEE Access – volume: 19 start-page: 2432 issue: 4 year: 2017 ident: CR133 article-title: State-of-the-art deep learning: evolving machine intelligence toward tomorrow’s intelligent network traffic control systems publication-title: IEEE Commun Surv Tutor – ident: CR142 – ident: CR94 – volume: 160 start-page: 53 year: 2015 ident: CR78 article-title: Support vector machines under adversarial label contamination publication-title: Neurocomputing – ident: CR176 – year: 2018 ident: CR68 publication-title: Reinforcement learning: an introduction – volume: 25 start-page: 152 year: 2018 ident: CR90 article-title: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model publication-title: J Comput Sci – volume: 25 start-page: 197 issue: 2 year: 2016 ident: CR104 article-title: A random forest guided tour publication-title: Test – volume: 53 start-page: 72 issue: 9 year: 2015 ident: CR11 article-title: Toward better horizontal integration among IoT services publication-title: IEEE Commun Mag – volume: 167 start-page: 636 year: 2020 end-page: 645 ident: CR185 article-title: A review of the advancement in intrusion detection datasets publication-title: Proced Computer Sci – ident: CR13 – ident: CR187 – volume: 111 start-page: 198 issue: 7 year: 2015 ident: CR57 article-title: A critical analysis on the security concerns of Internet of Things (IoT) publication-title: Int J Comput Appl – volume: 9 start-page: 462 issue: 2 year: 2009 ident: CR115 article-title: Intrusion detection using fuzzy association rules publication-title: Appl Soft Comput – ident: CR55 – volume: 6 start-page: 5 issue: 1 year: 2017 ident: CR16 article-title: Wireless sensor network based smart grid communications: cyber attacks, intrusion detection system and topology control publication-title: Electronics – volume: 110 start-page: 33 year: 2018 ident: CR95 article-title: Nearest neighbors based density peaks approach to intrusion detection publication-title: Chaos Solitons Fractals – volume: 9 start-page: 794326 issue: 8 year: 2013 ident: CR38 article-title: Routing attacks and countermeasures in the RPL-based internet of things publication-title: Int J Distrib Sens Netw – volume: 349 start-page: 255 issue: 6245 year: 2015 ident: CR62 article-title: Machine learning: trends, perspectives, and prospects publication-title: Science – volume: 61 start-page: 217 year: 2014 ident: CR192 article-title: SmartSantander: IoT experimentation over a smart city testbed publication-title: Comput Netw – volume: 13 start-page: 6492 issue: 5 year: 2013 ident: CR9 article-title: An easy to deploy street light control system based on wireless communication and LED technology publication-title: Sensors – volume: 7 start-page: 131 issue: 3 year: 2015 ident: CR193 article-title: Applying correlation and regression analysis to detect security incidents in the internet of things publication-title: Int J Commun Netw Inf Secur – ident: CR4 – volume: 54 start-page: 1 year: 2014 ident: CR3 article-title: The Internet of Things vision: key features, applications and open issues publication-title: Comput Commun – ident: CR35 – ident: CR29 – volume: 56 start-page: 9999 year: 2014 ident: CR83 article-title: Linear SVM-based android malware detection for reliable IoT services publication-title: J Appl Math – volume: 21 start-page: 132 year: 2013 ident: CR27 article-title: Interaction system based on Internet of Things as support for education publication-title: Procedia Comput Sci – volume: 74 start-page: 417 year: 2017 ident: CR100 article-title: CLAPP: a self constructing feature clustering approach for anomaly detection publication-title: Future Gener Comput Syst – ident: CR174 – ident: CR46 – ident: CR67 – ident: CR50 – ident: CR157 – ident: CR136 – volume: 122 start-page: 13 year: 2013 ident: CR167 article-title: Network anomaly detection with the restricted Boltzmann machine publication-title: Neurocomputing – ident: CR181 – volume: 4 start-page: 5947 issue: 5 year: 2009 ident: CR168 article-title: Deep belief networks publication-title: Scholarpedia – ident: CR175 – volume: 61 start-page: 85 year: 2015 ident: CR65 article-title: Deep learning in neural networks: an overview publication-title: Neural Netw – volume: 19 start-page: 974 issue: 4 year: 2019 ident: CR84 article-title: Adversarial samples on android malware detection systems for IoT systems publication-title: Sensors – ident: CR152 – volume: 2 start-page: 512 issue: 1 year: 2018 ident: CR91 article-title: A comparative study of data mining algorithms for high detection rate in intrusion detection system publication-title: Ann Emerg Technol Comput – volume: 11 start-page: 2661 issue: 8 year: 2013 ident: CR30 article-title: SVELTE: real-time intrusion detection in the Internet of Things publication-title: Ad Hoc Netw – ident: CR40 – ident: CR180 – volume: 7 start-page: 129 issue: 03 year: 2016 ident: CR106 article-title: Feature selection for intrusion detection using random forest publication-title: J Inf Secur – ident: CR146 – volume: 111 start-page: 268 year: 2016 ident: CR112 article-title: Soft set based association rule mining publication-title: Knowl-Based Syst – volume: 35 start-page: 14 year: 2015 ident: CR125 article-title: Ensembles of incremental learners to detect anomalies in ad hoc sensor networks publication-title: Ad Hoc Netw – ident: CR130 – ident: CR17 – ident: CR34 – volume: 17 start-page: 2347 issue: 4 year: 2015 ident: CR24 article-title: Internet of things: a survey on enabling technologies, protocols, and applications publication-title: IEEE Commun Surv Tutor – volume: 51 start-page: 403 issue: 3 year: 2019 ident: CR97 article-title: A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers publication-title: Artif Intell Rev – ident: CR141 – volume: 4 start-page: 22 issue: 2 year: 2016 ident: 9496_CR140 publication-title: IEEE Geosci Remote Sens Mag doi: 10.1109/MGRS.2016.2540798 – ident: 9496_CR74 doi: 10.1109/PCCC.2017.8280489 – ident: 9496_CR116 doi: 10.1007/978-3-319-21542-6_4 – volume: 61 start-page: 5 issue: 4/5 year: 2017 ident: 9496_CR183 publication-title: IBM J Res Dev doi: 10.1147/JRD.2017.2708299 – volume: 9 start-page: 313 issue: 6 year: 2015 ident: 9496_CR124 publication-title: IET Inf Secur doi: 10.1049/iet-ifs.2014.0099 – ident: 9496_CR136 – volume: 6 start-page: 5128 year: 2018 ident: 9496_CR145 publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2793966 – volume: 25 start-page: 197 issue: 2 year: 2016 ident: 9496_CR104 publication-title: Test doi: 10.1007/s11749-016-0481-7 – volume: 30 start-page: 174 year: 2012 ident: 9496_CR128 publication-title: Procedia Eng. doi: 10.1016/j.proeng.2012.01.849 – ident: 9496_CR156 doi: 10.1109/ARGENCON.2016.7585247 – volume: 46 start-page: 55 issue: 4 year: 2014 ident: 9496_CR49 publication-title: ACM Comput Surv doi: 10.1145/2542049 – ident: 9496_CR166 doi: 10.1007/978-3-642-35289-8_32 – ident: 9496_CR189 doi: 10.5220/0006639801080116 – ident: 9496_CR67 – volume: 122 start-page: 13 year: 2013 ident: 9496_CR167 publication-title: Neurocomputing doi: 10.1016/j.neucom.2012.11.050 – volume: 54 start-page: 396 year: 2016 ident: 9496_CR19 publication-title: Renew Sustain Energy Rev doi: 10.1016/j.rser.2015.10.036 – ident: 9496_CR37 doi: 10.1145/2508859.2512494 – ident: 9496_CR121 doi: 10.1109/ICCUBEA.2015.61 – ident: 9496_CR26 – volume: 5 start-page: 18042 year: 2017 ident: 9496_CR149 publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2747560 – ident: 9496_CR111 doi: 10.1109/CSE-EUC.2017.118 – volume: 134 start-page: 458 year: 2018 ident: 9496_CR154 publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2018.07.183 – volume: 6 start-page: 539 issue: 4 year: 2013 ident: 9496_CR56 publication-title: Secur Commun Netw doi: 10.1002/sec.681 – ident: 9496_CR44 doi: 10.4018/978-1-5225-0105-3 – volume: 54 start-page: 1 year: 2014 ident: 9496_CR3 publication-title: Comput Commun doi: 10.1016/j.comcom.2014.09.008 – volume: 35 start-page: 14 year: 2015 ident: 9496_CR125 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2015.07.013 – ident: 9496_CR147 – ident: 9496_CR32 doi: 10.1109/ICEICT.2016.7879701 – volume: 19 start-page: 446 issue: 1 year: 2016 ident: 9496_CR20 publication-title: IEEE Commun Surv Tutor doi: 10.1109/COMST.2016.2627399 – ident: 9496_CR123 doi: 10.1109/ICBDACI.2017.8070818 – volume-title: Deep learning year: 2016 ident: 9496_CR63 – ident: 9496_CR141 doi: 10.1145/3029806.3029823 – ident: 9496_CR46 doi: 10.1109/ICNC.2011.6022060 – volume: 49 start-page: 112 year: 2015 ident: 9496_CR190 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2014.11.011 – volume: 32 start-page: 96 issue: 1 year: 2018 ident: 9496_CR132 publication-title: IEEE Netw doi: 10.1109/MNET.2018.1700202 – volume: 42 start-page: 186 issue: 10 year: 2018 ident: 9496_CR184 publication-title: J Med Syst doi: 10.1007/s10916-018-1045-z – volume-title: Reinforcement learning: an introduction year: 2018 ident: 9496_CR68 – ident: 9496_CR129 doi: 10.1109/GLOCOM.2017.8254027 – volume-title: Statistical and machine-learning data mining: techniques for better predictive modeling and analysis of big data year: 2017 ident: 9496_CR79 – volume: 71 start-page: 66 year: 2018 ident: 9496_CR172 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2018.06.017 – volume: 9 start-page: 462 issue: 2 year: 2009 ident: 9496_CR115 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2008.06.001 – volume: 17 start-page: 2347 issue: 4 year: 2015 ident: 9496_CR24 publication-title: IEEE Commun Surv Tutor doi: 10.1109/COMST.2015.2444095 – volume: 22 start-page: 1101 issue: 5 year: 2018 ident: 9496_CR96 publication-title: Intell Data Anal doi: 10.3233/IDA-173493 – volume: 85 start-page: 88 year: 2018 ident: 9496_CR153 publication-title: Fut Gener Comput Syst doi: 10.1016/j.future.2018.03.007 – ident: 9496_CR45 – volume: 17 start-page: 12 issue: 3 year: 2018 ident: 9496_CR164 publication-title: IEEE Pervasive Comput doi: 10.1109/MPRV.2018.03367731 – ident: 9496_CR15 doi: 10.1109/RAIT.2016.7507884 – volume: 27 start-page: 130 issue: 2 year: 2015 ident: 9496_CR71 publication-title: Shanghai Archiv Psychiatry – ident: 9496_CR14 doi: 10.1109/ICEMIS.2016.7745295 – ident: 9496_CR175 – volume: 50 start-page: 23 issue: 2 year: 2017 ident: 9496_CR118 publication-title: ACM Comput Surv doi: 10.1145/3054925 – volume: 24 start-page: 1821 issue: 5 year: 2018 ident: 9496_CR81 publication-title: Wireless Netw doi: 10.1007/s11276-016-1439-0 – ident: 9496_CR146 doi: 10.1609/aaai.v29i1.9513 – volume: 2 start-page: 512 issue: 1 year: 2018 ident: 9496_CR91 publication-title: Ann Emerg Technol Comput – ident: 9496_CR60 doi: 10.1145/2381716.2381867 – ident: 9496_CR50 doi: 10.1109/ICCIC.2013.6724156 – ident: 9496_CR170 – volume: 13 start-page: 6492 issue: 5 year: 2013 ident: 9496_CR9 publication-title: Sensors doi: 10.3390/s130506492 – volume: 9 start-page: 105 issue: 3 year: 2015 ident: 9496_CR113 publication-title: IUP J Comput Sci – volume: 78 start-page: 507 year: 2016 ident: 9496_CR127 publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2016.02.095 – ident: 9496_CR158 doi: 10.1142/9789813143180_0009 – ident: 9496_CR165 doi: 10.1109/CISS.2019.8693059 – volume-title: Classification and regression trees year: 2017 ident: 9496_CR69 doi: 10.1201/9781315139470 – volume: 163 start-page: 15 issue: 8 year: 2017 ident: 9496_CR70 publication-title: Int J Comput Appl – volume: 9 start-page: 794326 issue: 8 year: 2013 ident: 9496_CR38 publication-title: Int J Distrib Sens Netw doi: 10.1155/2013/794326 – ident: 9496_CR181 – ident: 9496_CR126 – ident: 9496_CR143 – ident: 9496_CR179 doi: 10.1155/2019/7045862 – volume: 5 start-page: 123 issue: 2 year: 2015 ident: 9496_CR86 publication-title: J Cryptogr Eng doi: 10.1007/s13389-014-0089-3 – volume: 7 start-page: 31711 year: 2019 ident: 9496_CR171 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2903723 – ident: 9496_CR40 doi: 10.1109/WD.2011.6098218 – volume: 167 start-page: 636 year: 2020 ident: 9496_CR185 publication-title: Proced Computer Sci doi: 10.1016/j.procs.2020.03.330 – volume: 34 start-page: 72 issue: 1 year: 2017 ident: 9496_CR186 publication-title: IEEE Softw doi: 10.1109/MS.2017.26 – ident: 9496_CR148 – volume: 4 start-page: 5947 issue: 5 year: 2009 ident: 9496_CR168 publication-title: Scholarpedia doi: 10.4249/scholarpedia.5947 – volume: 19 start-page: 2432 issue: 4 year: 2017 ident: 9496_CR133 publication-title: IEEE Commun Surv Tutor doi: 10.1109/COMST.2017.2707140 – volume: 21 start-page: 132 year: 2013 ident: 9496_CR27 publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2013.09.019 – ident: 9496_CR117 doi: 10.1007/978-1-4899-7488-4_293 – ident: 9496_CR120 – volume: 14 start-page: 24188 issue: 12 year: 2014 ident: 9496_CR31 publication-title: Sensors doi: 10.3390/s141224188 – ident: 9496_CR2 – ident: 9496_CR177 doi: 10.1109/GLOBECOM38437.2019.9014102 – volume: 6 start-page: 33789 year: 2018 ident: 9496_CR108 publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2841987 – volume: 105 start-page: 2295 issue: 12 year: 2017 ident: 9496_CR134 publication-title: Proc IEEE doi: 10.1109/JPROC.2017.2761740 – volume: 7 start-page: 25 issue: 2 year: 2016 ident: 9496_CR41 publication-title: Information doi: 10.3390/info7020025 – volume: 5 start-page: 129 issue: 3 year: 2015 ident: 9496_CR150 publication-title: Int J Space-Based Situated Comput doi: 10.1504/IJSSC.2015.070953 – volume: 61 start-page: 217 year: 2014 ident: 9496_CR192 publication-title: Comput Netw doi: 10.1016/j.bjp.2013.12.020 – ident: 9496_CR75 doi: 10.1145/3266444.3266452 – ident: 9496_CR174 doi: 10.1109/CCWC.2019.8666588 – ident: 9496_CR187 – ident: 9496_CR64 – volume: 27 start-page: 1773 issue: 8 year: 2015 ident: 9496_CR85 publication-title: IEEE Trans Neural Netw Learn Syst doi: 10.1109/TNNLS.2015.2404803 – ident: 9496_CR52 doi: 10.1109/iThings/CPSCom.2011.84 – ident: 9496_CR77 doi: 10.1007/978-1-4899-7641-3_9 – ident: 9496_CR101 doi: 10.1145/3321408.3321588 – volume: 7 start-page: 131 issue: 3 year: 2015 ident: 9496_CR193 publication-title: Int J Commun Netw Inf Secur – volume: 111 start-page: 198 issue: 7 year: 2015 ident: 9496_CR57 publication-title: Int J Comput Appl – volume: 111 start-page: 268 year: 2016 ident: 9496_CR112 publication-title: Knowl-Based Syst doi: 10.1016/j.knosys.2016.08.020 – ident: 9496_CR72 doi: 10.1109/SECON.2016.7506774 – ident: 9496_CR51 doi: 10.1109/PCCC.2015.7410342 – ident: 9496_CR17 doi: 10.1109/ICMSAO.2015.7152200 – volume: 24 start-page: 109 year: 2017 ident: 9496_CR89 publication-title: J Appl Logic doi: 10.1016/j.jal.2016.11.018 – ident: 9496_CR93 – volume: 51 start-page: 48 issue: 3 year: 2018 ident: 9496_CR103 publication-title: ACM Comput Surv – ident: 9496_CR144 doi: 10.1109/ICFHR.2016.0052 – ident: 9496_CR33 doi: 10.1007/978-94-007-7262-5_137 – ident: 9496_CR180 – volume: 121 start-page: 6989 issue: 9 year: 2015 ident: 9496_CR42 publication-title: Int J Comput Appl – ident: 9496_CR98 doi: 10.1109/ICTS.2017.8265667 – volume: 38 start-page: 360 year: 2016 ident: 9496_CR122 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2015.10.011 – volume: 11 start-page: 41 issue: 1 year: 2016 ident: 9496_CR119 publication-title: IEEE Comput Intell Mag doi: 10.1109/MCI.2015.2471235 – volume: 14 start-page: 2417 issue: 10 year: 2019 ident: 9496_CR161 publication-title: Int J Appl Eng Res – ident: 9496_CR191 – ident: 9496_CR142 doi: 10.1007/978-3-319-49445-6_1 – volume: 29 start-page: 462 issue: 4 year: 2017 ident: 9496_CR82 publication-title: J King Saud Univ Comput Inf Sci doi: 10.1016/j.jksus.2017.05.013 – volume: 74 start-page: 133 year: 2016 ident: 9496_CR18 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2016.08.012 – volume: 20 start-page: 2923 issue: 4 year: 2018 ident: 9496_CR159 publication-title: IEEE Commun Surv Tutor doi: 10.1109/COMST.2018.2844341 – ident: 9496_CR47 – volume: 51 start-page: 403 issue: 3 year: 2019 ident: 9496_CR97 publication-title: Artif Intell Rev doi: 10.1007/s10462-017-9567-1 – ident: 9496_CR25 doi: 10.17487/rfc7252 – volume: 25 start-page: 152 year: 2018 ident: 9496_CR90 publication-title: J Comput Sci doi: 10.1016/j.jocs.2017.03.006 – ident: 9496_CR139 doi: 10.1109/CVPR.2009.5206848 – volume: 5 start-page: 1842 issue: 1 year: 2016 ident: 9496_CR88 publication-title: Int J Sci Res – volume: 19 start-page: 974 issue: 4 year: 2019 ident: 9496_CR84 publication-title: Sensors doi: 10.3390/s19040974 – volume: 11 start-page: 8 year: 2017 ident: 9496_CR80 publication-title: KSII Trans Internet Inf Syst – volume: 58 start-page: 49 issue: 1 year: 2011 ident: 9496_CR28 publication-title: Wireless Pers Commun doi: 10.1007/s11277-011-0288-5 – ident: 9496_CR76 – ident: 9496_CR138 – ident: 9496_CR137 doi: 10.1007/978-3-319-47075-7_52 – volume: 41 start-page: 1690 issue: 4 year: 2014 ident: 9496_CR73 publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2013.08.066 – volume: 349 start-page: 255 issue: 6245 year: 2015 ident: 9496_CR62 publication-title: Science doi: 10.1126/science.aaa8415 – volume: 105 start-page: 233 year: 2018 ident: 9496_CR151 publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2018.03.056 – volume: 9 start-page: 205 issue: 5 year: 2015 ident: 9496_CR163 publication-title: Int J Secur Appl – ident: 9496_CR4 doi: 10.1109/CNS.2014.6997469 – volume: 6 start-page: 5 issue: 1 year: 2017 ident: 9496_CR16 publication-title: Electronics doi: 10.3390/electronics6010005 – volume: 5 start-page: 121 issue: 01 year: 2016 ident: 9496_CR59 publication-title: J Comput Commun doi: 10.4236/jcc.2017.51010 – volume: 110 start-page: 33 year: 2018 ident: 9496_CR95 publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2018.03.010 – volume: 10 start-page: 1497 issue: 7 year: 2012 ident: 9496_CR1 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2012.02.016 – volume: 42 start-page: 193 issue: 1 year: 2015 ident: 9496_CR114 publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2014.08.002 – volume: 7 start-page: 129 issue: 03 year: 2016 ident: 9496_CR106 publication-title: J Inf Secur – ident: 9496_CR29 doi: 10.1109/IBCAST.2014.6778179 – ident: 9496_CR110 – volume: 10 start-page: 83 year: 2017 ident: 9496_CR131 publication-title: J Electr Comput Eng – ident: 9496_CR182 doi: 10.1109/ICCV.2017.115 – volume: 3 start-page: 262 issue: 4 year: 2000 ident: 9496_CR188 publication-title: ACM Trans Inf Syst Secur doi: 10.1145/382912.382923 – volume: 70 start-page: 1099 issue: 11 year: 2013 ident: 9496_CR54 publication-title: Int J Comput Appl – ident: 9496_CR34 doi: 10.1109/INM.2015.7140344 – ident: 9496_CR39 doi: 10.1109/ICC.2014.6883583 – volume: 54 start-page: 40 issue: 7 year: 2016 ident: 9496_CR23 publication-title: IEEE Commun Mag doi: 10.1109/MCOM.2016.7514162 – volume: 12 start-page: 65 issue: 1 year: 2017 ident: 9496_CR99 publication-title: IADIS Int J Comput Sci Inf Syst – ident: 9496_CR152 – ident: 9496_CR194 doi: 10.1109/IACS.2018.8355434 – volume: 7 start-page: 1072 issue: 10 year: 2017 ident: 9496_CR21 publication-title: Appl Sci doi: 10.3390/app7101072 – ident: 9496_CR7 doi: 10.1109/ISCC.2015.7405513 – volume: 74 start-page: 417 year: 2017 ident: 9496_CR100 publication-title: Future Gener Comput Syst doi: 10.1016/j.future.2016.12.040 – ident: 9496_CR6 doi: 10.1016/j.swevo.2019.100631 – ident: 9496_CR48 – ident: 9496_CR130 doi: 10.1109/CMC.2009.172 – ident: 9496_CR176 doi: 10.1109/IDAACS.2017.8095118 – ident: 9496_CR135 doi: 10.1007/978-3-642-15825-4_10 – volume: 80 start-page: 644 issue: 3 year: 2014 ident: 9496_CR58 publication-title: J Comput Syst Sci doi: 10.1016/j.jcss.2013.06.016 – volume: 74 start-page: 5156 issue: 10 year: 2018 ident: 9496_CR92 publication-title: J Supercomput doi: 10.1007/s11227-018-2413-7 – ident: 9496_CR157 – volume: 14 start-page: 52 issue: 1 year: 2016 ident: 9496_CR12 publication-title: Int J Comput Sci Inf Secur – volume: 11 start-page: 2661 issue: 8 year: 2013 ident: 9496_CR30 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2013.04.014 – volume: 59 start-page: 70 issue: 6 year: 2016 ident: 9496_CR61 publication-title: Commun ACM doi: 10.1145/2851486 – ident: 9496_CR36 doi: 10.1109/WiMOB.2013.6673419 – volume: 76 start-page: 146 year: 2015 ident: 9496_CR5 publication-title: Comput Netw doi: 10.1016/j.comnet.2014.11.008 – ident: 9496_CR87 doi: 10.1007/978-3-319-21476-4_2 – volume: 61 start-page: 85 year: 2015 ident: 9496_CR65 publication-title: Neural Netw doi: 10.1016/j.neunet.2014.09.003 – volume: 82 start-page: 761 year: 2018 ident: 9496_CR155 publication-title: Fut Gener Comput Syst doi: 10.1016/j.future.2017.08.043 – ident: 9496_CR162 doi: 10.1109/IJCNN.2017.7966342 – volume: 89 start-page: 213 year: 2016 ident: 9496_CR107 publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2016.06.047 – volume: 56 start-page: 9999 year: 2014 ident: 9496_CR83 publication-title: J Appl Math – ident: 9496_CR22 doi: 10.1109/ICEDSA.2016.7818534 – ident: 9496_CR10 doi: 10.1145/2971648.2971670 – volume: 18 start-page: 1153 issue: 2 year: 2015 ident: 9496_CR105 publication-title: IEEE Commun Surv Tutor doi: 10.1109/COMST.2015.2494502 – ident: 9496_CR173 – ident: 9496_CR13 doi: 10.14569/IJACSA.2015.060316 – volume: 10 start-page: 563 issue: 3 year: 2017 ident: 9496_CR8 publication-title: Energ Effi doi: 10.1007/s12053-016-9476-1 – volume: 160 start-page: 53 year: 2015 ident: 9496_CR78 publication-title: Neurocomputing doi: 10.1016/j.neucom.2014.08.081 – volume: 53 start-page: 72 issue: 9 year: 2015 ident: 9496_CR11 publication-title: IEEE Commun Mag doi: 10.1109/MCOM.2015.7263375 – ident: 9496_CR109 doi: 10.1109/SPW.2018.00013 – ident: 9496_CR35 doi: 10.1007/978-3-642-04492-2_66 – ident: 9496_CR94 – volume: 47 start-page: 1017 issue: 4 year: 2016 ident: 9496_CR160 publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2016.2536638 – ident: 9496_CR43 doi: 10.1109/CCNC.2016.7444797 – ident: 9496_CR178 doi: 10.1109/ACCESS.2019.2913895 – ident: 9496_CR53 doi: 10.1109/CNS.2014.6997468 – volume: 5 start-page: 150 issue: 3 year: 2016 ident: 9496_CR102 publication-title: Int J Comput – volume: 42 start-page: 146 year: 2018 ident: 9496_CR169 publication-title: Inf Fusion doi: 10.1016/j.inffus.2017.10.006 – ident: 9496_CR55 doi: 10.1109/WiCOM.2012.6478720 – ident: 9496_CR66 |
| SSID | ssj0054992 |
| Score | 2.653126 |
| Snippet | Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 3211 |
| SubjectTerms | Applications programs Deep learning Domains Electronic devices Engineering Firewalls Intelligent networks Internet of Things Intrusion detection systems Machine learning Mathematical and Computational Engineering Original Paper Security management Smart buildings Smart grid Smart grid technology Wireless networks Wireless sensor networks |
| Title | A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges |
| URI | https://link.springer.com/article/10.1007/s11831-020-09496-0 https://www.proquest.com/docview/2532600320 |
| Volume | 28 |
| WOSCitedRecordID | wos000580462300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1886-1784 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0054992 issn: 1134-3060 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3BTsMwDI1gcIADgwFiMFAO3FilpmnTlts0mNiBaWIb2q1KmgQhoXZaBxd-niRNKSBAgmuTWFUcx3ZsPwNwHiPuIiqpoxGzHT_ksUN5jBwSUaVgfS4xK5tNhKNRNJ_HY1sUVlTZ7lVI0tzUdbGbOn3K9VXujnJJdOrsOthQ6i7S4ng3ua_uX-3wmBgnwvrNn7i2VOZ7Gp_VUW1jfgmLGm0zaP7vP3fBjrUuYa88DntgTWQt0LSWJrRyXLTA9gcYwn3w2oNliADmGbw12ZUCWuDVB0gzDq-EWNRfxnWBZgFzCYdXE6hsXzjMp5eKks73hLOFfkoounBiG-TBss9f19DrVy1cigMwG1xP-zeObcrgpEpaVw5ihAYx1shzfiq5IBIrbvPQpR5jAQ-Zx5TeZT6hJHKFx0lKBSKpujYEF8q6w4egkeWZOAIwUK5KSqUfSRz5NCQxQ4zHPqMhQ0Ry1Aao4k2SWsRy3TjjKamxlvVeJ2qvE7PXidsGF-9rFiVex6-zOxXLEyu7ReIFWKP2Y08NdysW18M_Uzv-2_QTsOXpBBnzpNMBjdXyWZyCzfRl9Vgsz8yZfgMp4-8S |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1RT8IwEL4omqgPoqgRRe2Db7Jk3Ua3-UZAAhEIETC8Le3aGRMzCENf_PO2W-fUqIm-ru1l6V17d7277wAufcxNTCNqKMRsw3G5b1DuY4N4VCpYh0c2y5pNuMOhN5v5I10UluTZ7nlIMr2pi2I3KX3S9ZXujnRJVOrsOmw4UmOpRL678X1-_yqHJ41xYlu9-RNTl8p8T-OzOipszC9h0VTbdMr_-8892NXWJWpm4rAPayKuQFlbmkif46QCOx9gCA_gtYmyEAGax2iQZlcKpIFXHxCNOWoLsSi-jIoCzQTNI9Rrj5G0fVFvPrmWlFS-J5ou1FNCUkdj3SAPZX3-6im9Vt7CJTmEaedm0uoauimDEcrTujIwI7Th2wp5zgkjLkhkS25z16QWYw3uMotJvcscQolnCouTkApMQnltCC6kdWcfQSmex-IYUEO6KiGNHC-yPYe6xGeYcd9h1GWYRBxXAee8CUKNWK4aZzwFBday2utA7nWQ7nVgVuHqfc0iw-v4dXYtZ3mgz24SWA1bofbblhyu5ywuhn-mdvK36Rew1Z0M-kG_N7w9hW1LJcukzzs1KK2Wz-IMNsOX1WOyPE_l-w1mTfH2 |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED90iuiD3-LH1Dz45opNP9LWt7E5HOoYzMneStIkIkhX7PTFf96kTa2KCuJr0x4lueTucne_H8BJhLmNqaSWRsy2vIBHFuURtkhIlYH1uHRZSTYRDAbhZBINP3TxF9XuVUqy7GnQKE3p7Czj8qxufFOaqMJgFfqo8ESX0c7DgqdJg3S8PrqrzmId_BT5Tuzq-39im7aZ72V8Nk21v_klRVpYnt7a__95HVaN14napZpswJxIN2HNeKDI7O98E1Y-wBNuwWsblakDNE3RTVF1KZABZL1HNOWoK0RWPxnWjZs5mkrU746Q8olRf3p7riTpOlA0zvQVQ95CI0Och0r-v1Yhr1NRu-TbMO5d3HYuLUPWYCVqF88szAj1I1cj0nmJ5IJIV2kBD2zqMObzgDlM2WPmEUpCWzicJFRgkqjjRHChvD53BxrpNBW7gHwVwiRUeqF0Q48GJGKY8chjNGCYSI73AFfrFCcGyVwTajzGNQaznutYzXVczHVs78Hp-zdZiePx69vNavljs6fz2PFdjebvOmq4VS13PfyztP2_vX4MS8NuL77uD64OYNnRNTTFrU8TGrOnZ3EIi8nL7CF_OipU_Q3R9Pra |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Review+on+Machine+Learning+and+Deep+Learning+Perspectives+of+IDS+for+IoT%3A+Recent+Updates%2C+Security+Issues%2C+and+Challenges&rft.jtitle=Archives+of+computational+methods+in+engineering&rft.au=Thakkar%2C+Ankit&rft.au=Lohiya%2C+Ritika&rft.date=2021-06-01&rft.issn=1134-3060&rft.eissn=1886-1784&rft.volume=28&rft.issue=4&rft.spage=3211&rft.epage=3243&rft_id=info:doi/10.1007%2Fs11831-020-09496-0&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11831_020_09496_0 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1134-3060&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1134-3060&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1134-3060&client=summon |