User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
  Citation Number 4
 Views 11
 Downloands 6
IoT Güvenliği İçin Kullanılan Makine Öğrenimi ve Derin Öğrenme Modelleri Üzerine Bir Derleme
2021
Journal:  
Bilişim Teknolojileri Dergisi
Author:  
Abstract:

Nesnelerin internetini (internet of things - IoT) oluşturan cihazlar ve bu cihazları birbirine bağlayan ağlar hızlı bir şekilde yaygınlaşmaktadır ve evrim geçirmektedir. Buna paralel olarak, IoT cihazlarına ve ağlarına yönelik saldırılar da hız kesmeden artmaya devam etmektedir. Bu derleme çalışmasında, genel olarak IoT ağlarındaki anormallik tabanlı saldırıları tespit etmek ve azaltmak için önerilen, makine öğrenimi ve derin öğrenme modellerinden oluşan güncel yaklaşımlar özetlenmiştir. Önerilen yaklaşımlar hakkında kısa bilgiler verilmektedir ve bu yaklaşımların avantajlarından ve dezavantajlarından bahsedilmektedir. Bu çalışmanın ana hedefi olarak, önerilen yaklaşımlarda kullanılan makine öğrenimi ve derin öğrenme modelleri ile ilgili, üç araştırma sorusunun yanıtı aranmaktadır. Bu araştırma sorularından birincisi, “IoT güvenliğinde kullanılan makine öğrenimi ve derin öğrenme modelleri, hangi metriklerle değerlendirilmektedir? “, ikincisi, “IoT güvenliği açısından, makine öğrenimi ve derin öğrenme modellerinde hangi veri kümeleri kullanılmaktadır? “ ve üçüncüsü ise, “IoT güvenliğinde hangi makine öğrenimi ve derin öğrenme modelleri kullanılmaktadır ve bunların uygulama alanları nelerdir? “. Bu çalışmada son olarak, incelenen çalışmalardaki eksiklikler tespit edilmektedir. Böylece, IoT güvenliği ile ilgili gelecekteki çalışmalar için bir bakış açısı sağlanmaktadır

Keywords:

A collection of machine learning and deep learning models used for IoT security
2021
Author:  
Abstract:

The devices that create the Internet of Things (IoT) and the networks that connect these devices are rapidly spreading and evolving. At the same time, attacks on IoT devices and networks continue to rise without cuts. This aggregation study summarizes current approaches consisting of machine learning and deep learning models, which are recommended to detect and reduce abnormal attacks in IoT networks in general. Short information is provided about the proposed approaches and the advantages and disadvantages of these approaches are discussed. The main objective of this study is to seek answers to three research questions related to machine learning and deep learning models used in the recommended approaches. The first of these research questions is, "Machine learning and deep learning models used in IoT safety are assessed by what metrics? "Secondly, "Which data sets are used in machine learning and deep learning models in terms of IoT security? " And the third is, "Which machine learning and deep learning models are used in IoT security and what are their areas of application? “ . . In this study, the shortcomings in the study are identified. This provides a perspective for future work on IoT security.

Keywords:

A Review Of Machine Learning and Deep Learning Models Used For Iot Security
2021
Author:  
Abstract:

Internet of things (IoT) devices and networks connecting these devices are rapidly spreading and evolving. In parallel, attacks against IoT devices and networks continue to increase unabated. In this review, current approaches, consisting of machine learning and deep learning models, which are recommended to detect and mitigate anomaly-based attacks in IoT networks in general, are summarized. Brief information about the proposed approaches is given, and the advantages and disadvantages of these approaches are mentioned. As the main objective of this paper, answers to three research questions about machine learning and deep learning models used in the proposed approaches are sought. The first of these research questions is, “With which metrics are machine learning and deep learning models used in IoT security evaluated? “, the second is, “In terms of IoT security, which datasets are used in machine learning and deep learning models? “ and the third is, “Which machine learning and deep learning models are used in IoT security and what are their application areas? “. Finally, deficiencies encountered in the studies are noted. Thus, a perspective is provided for future work on IoT security.

Keywords:

Citation Owners
Attention!
To view citations of publications, you must access Sobiad from a Member University Network. You can contact the Library and Documentation Department for our institution to become a member of Sobiad.
Off-Campus Access
If you are affiliated with a Sobiad Subscriber organization, you can use Login Panel for external access. You can easily sign up and log in with your corporate e-mail address.
Similar Articles












Bilişim Teknolojileri Dergisi

Field :   Eğitim Bilimleri; Fen Bilimleri ve Matematik

Journal Type :   Uluslararası

Metrics
Article : 443
Cite : 3.237
2023 Impact : 0.458
Bilişim Teknolojileri Dergisi