2 code implementations • 17 Oct 2023 • Kahraman Kostas, Mike Just, Michael A. Lones
In this paper we present an approach for modelling IoT network attacks that focuses on generalizability, yet also leads to better detection and performance.
Explainable Artificial Intelligence (XAI) feature selection +1
2 code implementations • IEEE Internet of Things Journal 2022 • Kahraman Kostas, Mike Just, Michael A. Lones
Device identification is one way to secure a network of IoT devices, whereby devices identified as suspicious can subsequently be isolated from a network.