MADS Based on DL Techniques on the Internet of Things (IoT): Survey
نویسندگان
چکیده
Technologically speaking, humanity lives in an age of evolution, prosperity, and great development, as a new generation the Internet has emerged; it is Things (IoT) which controls all aspects lives, from different devices home to large industries. Despite tremendous benefits offered by IoT, still there are some challenges regarding privacy information security. The traditional techniques used Malware Anomaly Detection Systems (MADS) could not give us robust protection we need IoT environments. Therefore, needed be replaced with Deep Learning (DL) improve MADS provide intelligence solutions protect against malware, attacks, intrusions, order preserve users increase their confidence dependence on systems. This research presents comprehensive study security applications, Intrusion (IDS), (MDS), role artificial intelligent (AI) improving IoT.
منابع مشابه
the role of task-based techniques on the acquisition of english language structures by the intermediate efl students
this study examines the effetivenss of task-based activities in helping students learn english language structures for a better communication. initially, a michigan test was administered to the two groups of 52 students majoring in english at the allameh ghotb -e- ravandi university to ensure their homogeneity. the students scores on the grammar part of this test were also regarded as their pre...
15 صفحه اولsurvey on the rule of the due & hindering relying on the sheikh ansaris ideas
قاعده مقتضی و مانع در متون فقهی کم و بیش مستند احکام قرار گرفته و مورد مناقشه فقهاء و اصولیین می باشد و مشهور معتقند مقتضی و مانع، قاعده نیست بلکه یکی از مسائل ذیل استصحاب است لذا نگارنده بر آن شد تا پیرامون این قاعده پژوهش جامعی انجام دهد. به عقیده ما مقتضی دارای حیثیت مستقلی است و هر گاه می گوییم مقتضی احراز شد یعنی با ماهیت مستقل خودش محرز گشته و قطعا اقتضاء خود را خواهد داشت مانند نکاح که ...
15 صفحه اولBayesian Modeling Based on Data from the Internet of Things
The Internet of Things is suggested as the upcoming revolution in the Information and communication technology due to its very high capability of making various businesses and industries more productive and efficient. This productivity comes from the emergence of innovation and the introduction of new capabilities for businesses. Different industries have shown varying reactions to IOT, but wha...
متن کاملA Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications
The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already...
متن کاملSurvey on Optimization Techniques of RFID for Internet of Things
RFID is a radio frequency identification technology using radio waves to transfer the data between a reader and a tag. RFID allows the sensor to read from a distance without sight contact, a unique code associated with tags. Data stored on a tag is transferred through radio frequency linked by RFID tagging which is a form of automatic identification and data capture technology. RFID is used in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics10212598