Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–2 dari 2 artikel
A Comparative Analysis of Supervised Machine Learning Algorithms for IoT Attack Detection and Classification
Ntayagabiri, Jean Pierre
; Bentaleb, Youssef
; Ndikumagenge, Jeremie
; El Makhtoum, Hind
Journal of Computing Theories and Applications
Vol 2
, No 3
(2025)
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, necessitating robust attack detection mechanisms. This study presents a comprehensive comparative analysis of ten supervised learning algorithms for IoT attack detection and classification, addressing the critical challenge of balancing detection accuracy with practical deployment constraints. Using the CICIoT2023 dataset, encompassing data from 105 IoT devices and 33 attack types, we evaluate N...
Sumber Asli
Google Scholar
DOI
A Comprehensive Approach to Protocols and Security in Internet of Things Technology
Ntayagabiri, Jean Pierre
; Bentaleb, Youssef
; Ndikumagenge, Jeremie
; EL Makhtoum, Hind
Journal of Computing Theories and Applications
Vol 2
, No 3
(2024)
The exponential growth of the Internet of Things (IoT) introduces a multitude of security challenges, as a vast number of connected devices often operate with inadequate protection measures. This vulnerability heightens the risk of cyberattacks, data breaches, and hacking, exposing systems and sensitive information to increased threats. Ensuring security in the IoT ecosystem while considering this rapidly expanding technology's physical limitations and specific requirements is a complex task. Th...
Sumber Asli
Google Scholar
DOI