Читать книгу Machine Learning Approach for Cloud Data Analytics in IoT - Группа авторов - Страница 80

References

Оглавление

1. Atlam, H.F., Alenezi, A., Alharthi, A., Walters, R.J., Wills, G.B., Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE International Conferenece, Exeter, UK, 2017, https://ieeexplore.ieee.org/document/8276823.

2. Tweneboah-Koduah, S., Skouby, K.E., Tadayoni, R., Cyber Security Threats to IoT Applications and Service Domains, Wireless Personal Communications. Int. J., 94, 4, June 2017. Springer.

3. https://www.softwaretestinghelp.com/iot-devices/

4. Hossain, Md. M., Fotouhi, M., Hasan, R., Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. IEEE 11th World Congress on Services, New York, NY, USA, June 2015, https://www.researchgate.net/publication/279801184_Towards_an_Analysis_of_Security_Issues_Challenges_and_Open_Problems_in_the_Internet_of_Things.

5. https://www.scnsoft.com/services/iot

6. Buch, R., Borad, N., Kalola, P., World of Cyber Security and Cybercrime. STM J., August 2018. https://www.researchgate.net/publication/327110771.

7. Saravanan, A. and Sathya Bama, S., A Review on Cyber Security and the Fifth Generation Cyberattacks. Orien. J. Comput. Sci. Technol., 12, 2, 50–56, 2019.

8. Fruhlinger, J., What is a cyber attack? Recent examples show disturbing trends, CSO |, 27 February 2020. https://www.csoonline.com/article/3237324/what-is-a-cyber-attack-recent-examples-show-disturbing-trends.html.

9. Wikipedia, https://en.wikipedia.org/wiki/Cyberattack.

10. Fruhlinger, J., Malware explained: How to prevent, detect and recover from it CSO |, 17 May 2019. https://www.csoonline.com/article/3295877/what-is-malware-viruses-worms-trojans-and-beyond.html.

11. Fruhlinger, J., What is phishing? How this cyber attack works and how to prevent it CSO|, 4 September 2020. https://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html.

12. Fruhlinger, J., Ransomware explained: How it works and how to remove it, CSO |, 19 June 2020. https://www.csoonline.com/article/3236183/what-is-ransomware-how-it-works-and-how-to-remove-it.html.

13. Wikipedia, https://en.wikipedia.org/wiki/Spyware

14. Gunjan, V.K., Kumar, A., Avdhanam, S., A Survey of Cyber Crime in India. Conference: ICACT, 2013.

15. https://www.ntsc.org/assets/pdfs/cyber-security-report-2020.pdf

16. Hilt, S., Kropotov, V., Mercês, F., Rosario, M., Sancho, D., The Internet of Things in the Cybercrime Underground, Trend Micro Research, For Raimund Genes, 1963–2017.

17. Kaufman, L.M., BAE Systems, Data Security in the World of Cloud Computing, Security & Privacy IEEE, ieeexplore.ieee.org, 2009.

18. IBM cloud education, in: Cloud Storage 24th, June 2019, https://www.ibm.com/cloud/learn/cloud-storage.

19. Wikipedia, https://en.wikipedia.org/wiki/Cloud_computing_security.

20. Carroll, M., van der Merwe, A., Kotzé, P., Secure Cloud Computing: Benefits, Risks and Controls. Conference: Information Security South Africa (ISSA), IEEE Xplore, 2011.

21. Survey, A., Integration of cloud computing and Internet of Things. Future Gener. Comput. Syst., 56, 2015. https://www.researchgate.net/publication/283236612_Integration_of_Cloud_computing_and_Internet_of_Things_A_survey.

22. Russel, S.J. and Norvig, P., Artificial Intelligence: A modern Approach, 2nd Edition, Pearson Education, Inc., Dorling Kindersley (India) Pvt. Ltd, 2007.

23. Sethi, A., Supervised Learning vs. Unsupervised Learning, 2020. https://www.analyticsvidhya.com/blog/2020/04/supervised-learning-unsupervised-learning/.

24. https://www.javatpoint.com/difference-between-supervised-and-unsupervised-learning

25. Perlman, A., The Growing Role of Machine Learning in Cybersecurity, June 18, 2019.

26. Katz, H., IoT Cybersecurity Challenges and Solutions, 2019.

27. https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/

*Corresponding author: suchismita.sahoo86@gmail.com

Machine Learning Approach for Cloud Data Analytics in IoT

Подняться наверх