Transparent Security Method for Automating IoT Security Assessments.
Rauli KaksonenKimmo HalunenMarko LaaksoJuha RöningPublished in: ISPEC (2023)
Keyphrases
- big data
- preprocessing
- dynamic programming
- high accuracy
- experimental evaluation
- cost function
- computational cost
- intrusion detection
- edge detection
- computational complexity
- support vector machine svm
- objective function
- mobile devices
- neural network
- pairwise
- detection method
- synthetic data
- classification method
- high precision