ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
2
views
56
references
Top references
cited by
50
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,375
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Author(s):
Muhammad Shafiq
,
Zhihong Tian
,
Ali Kashif Bashir
,
Xiaojiang Du
,
Mohsen Guizani
Publication date
Created:
July 2020
Publication date
(Print):
July 2020
Journal:
Computers & Security
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Further versions
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Resource Identification
Most cited references
56
Record
: found
Abstract
: not found
Article
: not found
Soft set theory—First results
D. Molodtsov
(1999)
0
comments
Cited
563
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Soft set theory
P.K. Maji
,
R. Biswas
,
A.R. Roy
(2003)
0
comments
Cited
279
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Feature Selection for Classification
M Dash
,
H. Liu
(1997)
0
comments
Cited
184
times
– based on
0
reviews
Review now
Bookmark
All references
Author and article information
Contributors
Zhihong Tian:
(View ORCID Profile)
Ali Kashif Bashir:
(View ORCID Profile)
Journal
Title:
Computers & Security
Abbreviated Title:
Computers & Security
Publisher:
Elsevier BV
ISSN (Print):
01674048
Publication date Created:
July 2020
Publication date (Print):
July 2020
Volume
: 94
Page
: 101863
Article
DOI:
10.1016/j.cose.2020.101863
SO-VID:
015c72fc-9140-4115-a82f-2b64b104fe53
Copyright ©
© 2020
License:
https://www.elsevier.com/tdm/userlicense/1.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,375
Detecting Malicious Attacks Using Principal Component Analysis in Medical Cyber-Physical Systems
Authors:
Wei Lu
Host revocation authority: A way of protecting mobile agents from malicious hosts
Authors:
A Hybrid Malicious Code Detection Method based on Deep Learning
Authors:
Yuancheng Li
,
Rong Ma
,
Runhai Jiao
See all similar
Cited by
47
SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles
Authors:
Randhir Kumar
,
Prabhat Kumar
,
Rakesh Tripathi
…
TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning
Authors:
Prabhat Kumar
,
Govind Gupta
,
Rakesh Tripathi
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks
Authors:
Prabhat Kumar
,
Govind P. Gupta
,
Rakesh Tripathi
See all cited by
Most referenced authors
294
J Zhang
X. Zhang
H Liu
See all reference authors