Firmware Injection Detection on IoT Devices Using Deep Random Forest

作者: E. Arul , A. Punidha , V. D. Ambeth Kumar , E. Yuvarani

DOI: 10.1007/978-981-15-7078-0_52

关键词:

摘要:

参考文章(23)
C. Ortega, J. Ignacio, A. Montull, E. Sobrino, Human based knowledge for the probe failure pattern classification with the use of a backpropagation neural network. Application on submicron linear technologies IEEE/SEMI 1998 IEEE/SEMI Advanced Semiconductor Manufacturing Conference and Workshop (Cat. No.98CH36168). pp. 165- 170 ,(1998) , 10.1109/ASMC.1998.731547
A. Rodriguez-Mota, P. J. Escamilla-Ambrosio, J. Happa, J.R.C. Nurse, Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation 2016 8th IEEE Latin-American Conference on Communications (LATINCOM). pp. 1- 6 ,(2016) , 10.1109/LATINCOM.2016.7811597
Muhamed Fauzi Bin Abbas, Thambipillai Srikanthan, Low-Complexity Signature-Based Malware Detection for IoT Devices Applications and Techniques in Information Security. pp. 181- 189 ,(2017) , 10.1007/978-981-10-5421-1_15
Sagar Gharge, Manik Chavan, An integrated approach for malicious tweets detection using NLP international conference inventive communication and computational technologies. pp. 435- 438 ,(2017) , 10.1109/ICICCT.2017.7975235
Silvia Wahballa Soliman, Mohammed Ali Sobh, Ayman M. Bahaa-Eldin, Taxonomy of malware analysis in the IoT international conference on computer engineering and systems. ,(2017) , 10.1109/ICCES.2017.8275362
Zhihua Cui, Fei Xue, Xingjuan Cai, Yang Cao, Gai-ge Wang, Jinjun Chen, Detection of Malicious Code Variants Based on Deep Learning IEEE Transactions on Industrial Informatics. ,vol. 14, pp. 3187- 3196 ,(2018) , 10.1109/TII.2018.2822680
Bin Wang, Rong-yang Zhao, Guo-yin Zhang, Jia-Hai Liang, Optimization of Location Information Hiding Algorithm for Anti Attack Applications and Techniques in Information Security. pp. 3- 11 ,(2018) , 10.1007/978-981-13-2907-4_1
Khanh Duy Tung Nguyen, Tran Minh Tuan, Son Hai Le, Anh Phan Viet, Mizuhito Ogawa, Nguyen Le Minh, None, Comparison of Three Deep Learning-based Approaches for IoT Malware Detection knowledge and systems engineering. pp. 382- 388 ,(2018) , 10.1109/KSE.2018.8573374
Dijana Oreski, Darko Androcec, Hybrid Data Mining Approaches for Intrusion Detection in the Internet of Things 2018 International Conference on Smart Systems and Technologies (SST). ,(2018) , 10.1109/SST.2018.8564573
Zhongjin Liu, Le Zhang, Qiuying Ni, Juntai Chen, Ru Wang, Ye Li, Yueying He, An Integrated Architecture for IoT Malware Analysis and Detection the internet of things. pp. 127- 137 ,(2018) , 10.1007/978-3-030-14657-3_14