The procedure of identifying and reacting to unauthorized or malicious behaviours
within the IOT system, is called IOT attack detection. There are some several advantages and
challenges associated with implementing and maintaining the detection systems. Some of the
limitations are Complexity, false positive and negative and scalability. To defeat these
restrictions, we suggested a deep-learning based classification model (INTE).
Reference
MK, A. C. (2024, April). Association of Academic Researchers and Faculties (AARF) . Retrieved
from International Research Journal of Mathematics, Engineering and IT:
https://www.aarf.asia/current/2024/Apr/jzi4t181CRRyU43.pdf
You must log in or register a new account in order to contact the publisher