Privacy Preservation Using Machine Learning in the Internet of Things
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Hyo-Sik Ham & Hwan-Hee Kim & Myung-Sup Kim & Mi-Jung Choi, 2014. "Linear SVM-Based Android Malware Detection for Reliable IoT Services," Journal of Applied Mathematics, Hindawi, vol. 2014, pages 1-10, September.
- Lorenzo D. Martino & Elisa Bertino, 2009. "Security for Web Services: Standards and Research Issues," International Journal of Web Services Research (IJWSR), IGI Global, vol. 6(4), pages 48-74, October.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Sharfah Ratibah Tuan Mat & Mohd Faizal Ab Razak & Mohd Nizam Mohmad Kahar & Juliza Mohamad Arif & Salwana Mohamad & Ahmad Firdaus, 2021. "Towards a systematic description of the field using bibliometric analysis: malware evolution," Scientometrics, Springer;Akadémiai Kiadó, vol. 126(3), pages 2013-2055, March.
- Iqbal H. Sarker, 2023. "Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects," Annals of Data Science, Springer, vol. 10(6), pages 1473-1498, December.
- Mohammed Talal & A. A. Zaidan & B. B. Zaidan & O. S. Albahri & M. A. Alsalem & A. S. Albahri & A. H. Alamoodi & M. L. M. Kiah & F. M. Jumaah & Mussab Alaa, 2019. "Comprehensive review and analysis of anti-malware apps for smartphones," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 72(2), pages 285-337, October.
- Ritika Raj Krishna & Aanchal Priyadarshini & Amitkumar V. Jha & Bhargav Appasani & Avireni Srinivasulu & Nicu Bizon, 2021. "State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions," Sustainability, MDPI, vol. 13(16), pages 1-46, August.
More about this item
Keywords
internet of things; IoT privacy; machine learning; privacy; malware detection; obfuscated malware; supervised learning algorithms;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:16:p:3477-:d:1215391. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.