IOT-based cyber security identification model through machine learning technique

Manual vulnerability evaluation tools produce erroneous data and lead to difficult analytical thinking. Such security concerns are exacerbated by the variety, imperfection, and redundancies of modern security repositories. These problems were common traits of producers and public vulnerability discl...

Full description

Bibliographic Details
Main Authors: Bechoo Lal, S. Ravichandran, R. Kavin, N. Anil Kumar, Dibyahash Bordoloi, R. Ganesh Kumar
Format: Article
Language:English
Published: Elsevier 2023-06-01
Series:Measurement: Sensors
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2665917423001277