scispace - formally typeset
Open AccessJournal ArticleDOI

Deep learning and big data technologies for IoT security

TLDR
A comprehensive survey on state-of-the-art deep learning, IoT security, and big data technologies is conducted and a thematic taxonomy is derived from the comparative analysis of technical studies of the three aforementioned domains.
About
This article is published in Computer Communications.The article was published on 2020-02-01 and is currently open access. It has received 193 citations till now. The article focuses on the topics: Big data.

read more

Citations
More filters
Journal Article

Apache Hadoop Goes Realtime at Facebook

TL;DR: The reasons why Facebook chose Hadoop and HBase over other systems such as Apache Cassandra and Voldemort are described and the application requirements for consistency, availability, partition tolerance, data model and scalability are discussed.
Journal ArticleDOI

Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey

TL;DR: An extensive survey on SDN and the edge computing ecosystem to solve the challenge of complex IoT management and comprehensively present security and privacy vulnerabilities in the SDIoT-Edge computing and detailed taxonomies of multiple attack possibilities in this paradigm.
Posted Content

A Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions.

TL;DR: A comprehensive survey on blockchain for big data, focusing on up-to-date approaches, opportunities, and future directions is provided, including blockchain for secure big data acquisition, data storage, data analytics, and data privacy preservation.
Journal ArticleDOI

Unmanned aerial vehicle for internet of everything: Opportunities and challenges

TL;DR: A UAV-enabled IoE (Ue-IoE) solution is introduced by exploiting UAVs’s mobility, in which it is shown that Ue-ioE can greatly enhance the scalability, intelligence and diversity of IoE.
Journal ArticleDOI

Machine learning approaches to IoT security: A systematic literature review

TL;DR: This extensive literature survey on the most recent publications in IoT security identified a few key research trends that will drive future research in this field.
References
More filters
Book

Data Mining: Concepts and Techniques

TL;DR: This book presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects, and provides a comprehensive, practical look at the concepts and techniques you need to get the most out of real business data.
Journal ArticleDOI

A fast learning algorithm for deep belief nets

TL;DR: A fast, greedy algorithm is derived that can learn deep, directed belief networks one layer at a time, provided the top two layers form an undirected associative memory.
Journal ArticleDOI

Backpropagation applied to handwritten zip code recognition

TL;DR: This paper demonstrates how constraints from the task domain can be integrated into a backpropagation network through the architecture of the network, successfully applied to the recognition of handwritten zip code digits provided by the U.S. Postal Service.
Journal ArticleDOI

Interrater reliability: the kappa statistic

Marry L. McHugh
- 15 Oct 2012 - 
TL;DR: While the kappa is one of the most commonly used statistics to test interrater reliability, it has limitations and levels for both kappa and percent agreement that should be demanded in healthcare studies are suggested.
Posted Content

Evaluation: from Precision, Recall and F-measure to ROC, Informedness, Markedness and Correlation

TL;DR: E elegant connections between the concepts of Informedness, Markedness, Correlation and Significance as well as their intuitive relationships with Recall and Precision are demonstrated.
Related Papers (5)