User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 29
 Downloands 3
Designing a participatory modelby using ensembleintelligence algorithms to detect security anomalies in wireless sensor-based IoT networks
2021
Journal:  
Turkish Journal of Computer and Mathematics Education
Author:  
Abstract:

Background: With the development and expansion of technologies and computing technologies, today the frontiers of knowledge are developing rapidly. One of the most important factors in starting these technologies is the formation of a computer network. purpose: Network traffic is very large and this leads to high data size and increased noise and makes it very difficult to extract meaningful information to detect abnormal events. Network training to detect abnormalities helps to identify the time of the attack. Early detection of attacks improves the stability of a system. Methods: The goal of this study is to design a proposed model to identify and detect malware attacks with appropriate accuracy and reduce the rate of malfunctions. To meet these goals, we used participatory machine learning algorithms. Results: According to the results, our proposed model has a better performance in intrusion detection of wireless sensor network attacks than the compared algorithms of decision tree, random tree and Naïve Bayes. Conclusion: Due to recent advances in data mining, the use of participatory model in identifying and detecting attacks of wireless sensor networks is very effective.

Keywords:

0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Turkish Journal of Computer and Mathematics Education

Journal Type :   Uluslararası

Metrics
Article : 1.706
Cite : 110
2023 Impact : 0.071
Turkish Journal of Computer and Mathematics Education