I agree that this site is using cookies. You can find further informations
here
.
X
Login
Merkliste (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
zur Desktop-Version
Toggle navigation
Merkliste
1 Ergebnisse
1
A feature exploration approach for IoT attack type classifi..:
, In:
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
,
Erfani, Masoud
;
Shoeleh, Farzaneh
;
Dadkhah, Sajjad
... - p. 582-588 , 2021
Link:
https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech..
RT T1
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
: T1
A feature exploration approach for IoT attack type classification
UL https://suche.suub.uni-bremen.de/peid=ieee-9730612&Exemplar=1&LAN=DE A1 Erfani, Masoud A1 Shoeleh, Farzaneh A1 Dadkhah, Sajjad A1 Kaur, Barjinder A1 Xiong, Pulei A1 Iqbal, Shahrear A1 Ray, Suprio A1 Ghorbani, Ali A. YR 2021 K1 Performance evaluation K1 Machine learning algorithms K1 Statistical analysis K1 Merging K1 Software K1 Sensors K1 Planning K1 Internet of Things K1 cybersecurity K1 IoT attack detection K1 IoT security K1 machine learning SP 582 OP 588 LK http://dx.doi.org/https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00101 DO https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00101 SF ELIB - SuUB Bremen
Export
RefWorks (nur Desktop-Version!)
Flow
(Zuerst in
Flow
einloggen, dann importieren)