References
- Mahmoud Elsisi; Minh-Quang Tran; Karar Mahmoud; Diaa-Eldin A. Mansour; Matti Lehtonen and Mohamed M. F. Darwish; (2021). Towards Secured Online Monitoring for Digitalized GIS Against Cyber-Attacks Based on IoT and Machine Learning . IEEE Access. http://doi:10.1109/ACCESS.2021.3083499
- MINH-QUANG TRAN, MAHMOUD ELSISI, KARARMAHMOUD , MENG-KUN LIU, MATTI LEHTONEN AND MOHAMED M. F. DARWISH. (2021). Experimental Setup for Online Fault Diagnosis of Induction Machines via Promising IoT and Machine Learning: Towards Industry 4.0 Empowerment. IEEE. 9, pp.115429-115441. http://doi:10.1109/ACCESS.2021.3105297
- Pallavi Arora; Baljeet Kaur and Marcio Andrey Teixeira; (2021). Evaluation of Machine Learning Algorithms Used on Attacks Detection in Industrial Control Systems . Journal of The Institution of Engineers (India): Series B. http://doi:10.1007/s40031-021-00563-z
- Hasan, Mahmudul; Milon Islam, Md.; Islam, Ishrak and Hashem, M.M.A. (2019). Attack and Anomaly Detection in IoT Sensors in IoT Sites Using Machine Learning Approaches. Internet of Things, 100059–. http://doi:10.1016/j.iot.2019.100059
- Aboelwafa, Mariam M. N.; Seddik, Karim G.; Eldefrawy, Mohamed H.; Gadallah, Yasser and Gidlund, Mikael (2020). A Machine Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT. IEEE Internet of Things Journal, 1–1. http://doi:10.1109/JIOT.2020.2991693
- YAKUB KAYODE SAHEED and AND MICHEALOLAOLU AROWOLO. (2021). Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Netw. IEEE. 9, pp.161546-161554. http://doi:10.1109/ACCESS.2021.3128837
- Ahmad Ali AlZubi; Mohammed Al-Maitah and Abdulaziz Alarifi; (2021). Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques . Soft Computing. http://doi:10.1007/s00500-021-05926-8
- Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang and Guizani, Mohsen (2020). CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine Learning Techniques. IEEE Internet of Things Journal, 1–1. http://doi:10.1109/JIOT.2020.3002255
- Rahman, Md Arafatur; Asyharia, A. Taufiq; Leong, L.S.; Satrya, G.B.; Tao, M. Hai and Zolkipli, M.F. (2020). Scalable Machine Learning-Based Intrusion Detection System for IoT-Enabled Smart Cities. Sustainable Cities and Society, 102324–. http://doi:10.1016/j.scs.2020.102324
- Pheeha Machaka, Olasupo Ajayi, Hloniphani Maluleke, Ferdinand Kahenga, Antoine Bagula, Kyandoghere Kyamakya. (2022). Modelling DDoS Attacks in IoT Networks Using Machine Learning. Springer., pp.1-20.
- Abhishek Verma and Virender Ranga. (2019). Machine Learning Based Intrusion Detection Systems for IoT Applications. Springer., pp.1-24. https://doi.org/10.1007/s11277-019-06986-8
- Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan and Raj Jain. (2019). Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things. IEEE. 6(4), pp.1-13. http://DOI:10.1109/JIOT.2019.2912022
- Adi, Erwin; Anwar, Adnan; Baig, Zubair and Zeadally, Sherali (2020). Machine learning and data analytics for the IoT. Neural Computing and Applications. http://doi:10.1007/s00521-020-04874-y
- Hussain, Fatima; Hussain, Rasheed; Hassan, Syed Ali and Hossain, Ekram (2020). Machine Learning in IoT Security: Current Solutions and Future Challenges. IEEE Communications Surveys & Tutorials, 1–1. http://doi:10.1109/COMST.2020.2986444
- Geetha, R. and Thilagam, T. (2020). A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Cyber Security. Archives of Computational Methods in Engineering,. http://doi:10.1007/s11831-020-09478-2
- Liang, Fan; Hatcher, William G.; Liao, Weixian; Gao, Weichao and Yu, Wei (2019). Machine Learning for Security and the Internet of Things: the Good, the Bad, and the Ugly. IEEE Access, 1–1. http://doi:10.1109/access.2019.2948912
- Mohanta, B. K., Jena, D., Satapathy, U., & Patnaik, S. (2020). Survey on IoT Security:Challenges and Solution using Machine Learning, Artificial Intelligence and Blockchain Technology. Internet of Things, 100227. http://doi:10.1016/j.iot.2020.100227
- da Costa, Kelton A.P.; Papa, João P.; Lisboa, Celso O.; Munoz, Roberto and de Albuquerque, Victor Hugo C. (2019). Internet of Things: A Survey on Machine Learning-based Intrusion Detection Approaches. Computer Networks, S1389128618308739–. http://doi:10.1016/j.comnet.2019.01.023
- Shereen Ismail, Diana Dawoud and Hassan Reza. (2022). Machine learning techniques for Detection of Cyber Attacks in IoT Use Cases. IEEE. .(.), pp.0481-0486.
- Iqbal H. Sarker,Asif Irshad Khan,Yoosef B. Abushark and Fawaz Alsolami. (2022). Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Direction. Springer, p.296–312. http://doi:10.20944/preprints202203.0087.v1
- Hao Xu, Zihan Sun, Yuan Cao and Hazrat Bilal. (2023). A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things. Springer, pp.1-13. https://doi.org/10.1007/s00500-023-09037-4
- Hemantha Krishna Bharadwaj; Aayush Agarwal;Vinay Chamola; Naga Rajiv Lakkaniga; Vikas Hassija; Mohsen Guizani and Biplab Sikdar; (2021). A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications . IEEE Access. http://doi:10.1109/access.2021.3059858
- Elena Becker, Maanak Gupta and Kshitiz Aryal. (2023). Using Machine Learning for Detection and Classification of Cyber Attacks in Edge IoT. IEEE, pp.1-11. http://DOI:10.1109/EDGE60047.2023.00063
- Hao Xu, Zihan Sun, Yuan Cao and Hazrat Bilal. (2023). A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things. Springer., p.14469–14481. https://doi.org/10.1007/s00500-023-09037-4
- Shaukat, Kamran; Luo, Suhuai; Varadharajan, Vijay; Hameed, Ibrahim A. and Xu, Min (2020). A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access, 8, 222310–222354. http://doi:10.1109/access.2020.3041951
- Prabhat Kumar; Govind P. Gupta and Rakesh Tripathi; (2021). Toward Design of an Intelligent Cyber Attack Detection System using Hybrid Feature Reduced Approach for IoT Networks . Arabian Journal for Science and Engineering. http://doi:10.1007/s13369-020-05181-3
- Skowron, Monika; Janicki, Artur and Mazurczyk, Wojciech (2020). Traffic Fingerprinting Attacks on Internet of Things using Machine Learning. IEEE Access, 1–1. http://doi:10.1109/ACCESS.2020.2969015
- Chhabra, Gurpal Singh; Singh, Varinder Pal and Singh, Maninder (2018). Cyber forensics framework for big data analytics in IoT environment using machine learning. Multimedia Tools and Applications. http://doi:10.1007/s11042-018-6338-1
- Eirini Anthi; Lowri Williams; Amir Javed and Pete Burnap; (2021). Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks . Computers & Security. http://doi:10.1016/j.cose.2021.102352
- Li, Fangyu; Shinde, Aditya; Shi, Yang; Ye, Jin; Li, Xiang-Yang and Song, Wen Zhan (2019). System Statistics Learning-Based IoT Security: Feasibility and Suitability. IEEE Internet of Things Journal, 1–1. http://doi:10.1109/JIOT.2019.2897063
- Moustafa, Nour, and Jill Slay. "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)." Military Communications and Information Systems Conference (MilCIS), 2015. IEEE, 2015.
- Moustafa, Nour, and Jill Slay. "The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 dataset and the comparison with the KDD99 dataset." Information Security Journal: A Global Perspective (2016): 1-14. https://doi.org/10.1080/19393555.2015.1125974
- Moustafa, Nour, et al. . "Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks." IEEE Transactions on Big Data (2017).
- Nelder, J. A.; Mead, R. (1965). A Simplex Method for Function Minimization. The Computer Journal, 7(4), 308–313. http://doi:10.1093/comjnl/7.4.308.
- S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi. Optimization by simulated annealing. Science, 220 (4598):671–680, 1983. https://doi.org/10.1126/science.220.4598.671
- M. J. D. Powell. A direct search optimization method that models the objective and constraint functions by linear interpolation. Advances in Optimization and Numerical Analysis, pages 51– 67, 1994. http://doi:10.1007/978-94-015-8330-5_4.
- UNSW-NB dataset. Retrieved from https://www.kaggle.com/datasets/mrwellsdavid/unsw-nb15