Deep Learning-Based Security Behaviour Analysis in IOT
Main Article Content
Abstract
Data correlation and the Internet of Things (IoT) are popular topics for market researchers in this technological society. An IoT framework generates a massive quantity of data, which has piqued the considerable research interest who need to mix large information analytics with system mastering ideas. Internet of Things (IoT) programs have certainly been hired in an extensive variety of industries, which include smart houses, healthcare, power control systems, and production while the Internet of Things provides several advantages, such as ease and effectiveness, it also offers several hazards. Deep Learning is a cutting-edge ai - powered technology that can be applied to the analytics and understanding of IoT data. It explains why deep learning is useful for predicting IoT data analytics. Aside from that, readers will be introduced to various deep neural networks. This paper attempts to provide a comprehensive overview of deep learning applications and models in the Internet of Things. It has become relatively reliable to analyze and identify abnormal traffic using these artificially created features and machine learning algorithms, but accurate labeling of the traffic data is required when developing supervised algorithm models.[1] It describes the many deep learning algorithms that can be useful in predictive analytics, as well as their architectures and how they work.
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.