You are currently viewing a new version of our website. To view the old version click .

IoT, Volume 3, Issue 2

June 2022 - 4 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Cover Story: Detecting abnormal traffic is one of the problematic areas for researchers in protecting network infrastructures from adversary activities. Numerous automatic approaches can detect abnormal traffic. However, accuracy is not the only issue with current intrusion detection systems, as their efficiency, flexibility, and scalability need to be enhanced to detect attack traffic from various IoT networks. Thus, this study concentrates on constructing an ensemble classifier using the proposed integrated evaluation metrics (IEMs) to determine the best performance of IDS models. The automated ranking and best selection method (RBSM) is performed using the proposed IEMs to select the best model for the ensemble classifier to detect highly accurate attacks using machine and deep learning approaches. View this paper

Articles (4)

  • Article
  • Open Access
7 Citations
5,278 Views
17 Pages

Expert Demand for Consumer Sleep Technology Features and Wearable Devices: A Case Study

  • Jaime K Devine,
  • Lindsay P. Schwartz,
  • Jake Choynowski and
  • Steven R Hursh

8 June 2022

Global demand for sleep-tracking wearables, or consumer sleep technologies (CSTs), is steadily increasing. CST marketing campaigns often advertise the scientific merit of devices, but these claims may not align with consensus opinion from sleep resea...

  • Article
  • Open Access
16 Citations
6,813 Views
30 Pages

28 April 2022

Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infras...

  • Review
  • Open Access
28 Citations
6,359 Views
12 Pages

22 April 2022

Federated Learning (FL) is a state-of-the-art technique used to build machine learning (ML) models based on distributed data sets. It enables In-Edge AI, preserves data locality, protects user data, and allows ownership. These characteristics of FL m...