Cyspace Labs

1200.00 Dollar US$
April 26, 2024 United States, Delaware, Middletown 12

Description


The procedure of identifying and reacting to unauthorized or malicious behaviours
within the IOT system, is called IOT attack detection. There are some several advantages and
challenges associated with implementing and maintaining the detection systems. Some of the
limitations are Complexity, false positive and negative and scalability. To defeat these
restrictions, we suggested a deep-learning based classification model (INTE).

Reference
MK, A. C. (2024, April). Association of Academic Researchers and Faculties (AARF) . Retrieved
from International Research Journal of Mathematics, Engineering and IT:
https://www.aarf.asia/current/2024/Apr/jzi4t181CRRyU43.pdf


Keywords: Cyspace Labs
Share by emailShare on FacebookShare on TwitterShare on Google+Share on LinkedInPin on Pinterest