nanoll extt
Please use this identifier to cite or link to this item: http://lrcdrs.bennett.edu.in:80/handle/123456789/5063
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBudhiraja, Ishan-
dc.date.accessioned2024-06-13T08:32:08Z-
dc.date.available2024-06-13T08:32:08Z-
dc.date.issued2023-
dc.identifier.issn1433-3058-
dc.identifier.urihttps://doi.org/10.1007/s00521-023-08634-6-
dc.identifier.urihttp://lrcdrs.bennett.edu.in:80/handle/123456789/5063-
dc.description.abstractThe usage of intelligent IoT devices is exponentially rising, and so the possibility of attacks in the IoT surfaces. The deep leaning algorithms are competent for directing the sanctuary investigation of IoT systems but have not upgraded the analysis of potential attacks in IoT. This paper aims to advance deep learning methods to create upgraded security strategies for IoT frameworks quickly. The study of the IoT security threats identified with inalienable or recently presented risks is done. Also, this paper does a quick examination of different possible attack surfaces for the IoT framework, and the potential risks identified with each character. The systematic survey of deep learning methods for IoT security and the existence of the chances, focal points, and weaknesses of every strategy opens the door significant for future research.en_US
dc.language.isoen_USen_US
dc.publisherNeural Computing and Applicationsen_US
dc.subjectDeep learningen_US
dc.subjectArtificial intelligenceen_US
dc.titleA systematic analysis of deep learning methods and potential attacks in internet-of-things surfacesen_US
dc.typeArticleen_US
dc.indexedscen_US
Appears in Collections:Journal Articles_SCSET

Files in This Item:
File Description SizeFormat 
A systematic analysis of deep learning methods and potential attacks.pdf
  Restricted Access
1.96 MBAdobe PDFView/Open Request a copy

Contact admin for Full-Text

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.