ACKNOWLEDGEMENTS
This work has been fully supported by the Croatian
Science Foundation under the project IP-2014-09-
3877.
REFERENCES
Abeshu, A., Chilamkurti, N., 2018. Deep Learning: The
Frontier for Distributed Attack Detection in Fog-to-
Things Computing. IEEE Communications Magazine
56, 169–175. https://doi.org/10.1109/MCOM.2018.
1700332
Agatonovic-Kustrin, S., Beresford, R., 2000. Basic
concepts of artificial neural network (ANN) modeling
and its application in pharmaceutical research. Journal
of Pharmaceutical and Biomedical Analysis 22, 717–
727. https://doi.org/10.1016/S0731-7085(99)00272-1
Ahmed, M.E., Kim, H., Park, M., 2017. Mitigating DNS
query-based DDoS attacks with machine learning on
software-defined networking, in: MILCOM 2017 -
2017 IEEE Military Communications Conference
(MILCOM). Presented at the MILCOM 2017 - 2017
IEEE Military Communications Conference
(MILCOM), IEEE, Baltimore, MD, USA, pp. 11–16.
https://doi.org/10.1109/MILCOM.2017.8170802
Ali, T., Nauman, M., Jan, S., 2018. Trust in IoT: dynamic
remote attestation through efficient behavior capture.
Cluster Computing 21, 409–421. https://doi.org/
10.1007/s10586-017-0877-5
Aminanto, M. E., Choi, R., Tanuwidjaja, H. C., Yoo, P.
D., Kim, K., 2018. Deep Abstraction and Weighted
Feature Selection for Wi-Fi Impersonation Detection.
IEEE Transactions on Information Forensics and
Security 13, 621–636. https://doi.org/10.1109/TIFS.
2017.2762828
Aminanto, M. E., Tanuwidjaja, H. C., Yoo, P. D., Kim,
K., 2017. Wi-Fi intrusion detection using weighted-
feature selection for neural networks classifier, in:
2017 International Workshop on Big Data and
Information Security (IWBIS). Presented at the 2017
International Workshop on Big Data and Information
Security (IWBIS), IEEE, Jakarta, Indonesia, pp. 99–
104. https://doi.org/10.1109/IWBIS.2017.8275109
Amor, N. B., Benferhat, S., Elouedi, Z., 2004. Naive
Bayes vs decision trees in intrusion detection systems.
ACM Press, p. 420. https://doi.org/10.1145/967900.
967989
Baldini, G., Giuliani, R., Steri, G., Neisse, R., 2017a.
Physical layer authentication of Internet of Things
wireless devices through permutation and dispersion
entropy, in: 2017 Global Internet of Things Summit
(GIoTS). Presented at the 2017 Global Internet of
Things Summit (GIoTS), IEEE, Geneva, Switzerland,
pp. 1–6. https://doi.org/10.1109/GIOTS.2017.8016272
Baldini, G., Steri, G., Giuliani, R., Gentile, C., 2017b.
Imaging time series for internet of things radio
frequency fingerprinting, in: 2017 International
Carnahan Conference on Security Technology
(ICCST). Presented at the 2017 International
Carnahan Conference on Security Technology
(ICCST), IEEE, Madrid, Spain, pp. 1–6.
https://doi.org/10.1109/CCST.2017.8167861
Bhunia, S.S., Gurusamy, M., 2017. Dynamic attack
detection and mitigation in IoT using SDN, in: 2017
27th International Telecommunication Networks and
Applications Conference (ITNAC). Presented at the
2017 27th International Telecommunication Networks
and Applications Conference (ITNAC), IEEE,
Melbourne, VIC, Australia, pp. 1–6. https://doi.org/
10.1109/ATNAC.2017.8215418
Canedo, J., Skjellum, A., 2016. Using machine learning to
secure IoT systems, in: 2016 14th Annual Conference
on Privacy, Security and Trust (PST). Presented at the
2016 14th Annual Conference on Privacy, Security
and Trust (PST), IEEE, Auckland, New Zealand, pp.
219–222. https://doi.org/10.1109/PST.2016.7906930
Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A.V.,
Rong, X., 2015. Data Mining for the Internet of
Things: Literature Review and Challenges.
International Journal of Distributed Sensor Networks
11, 431047. https://doi.org/10.1155/2015/431047
Cho, T., Kim, H., Yi, J.H., 2017. Security Assessment of
Code Obfuscation Based on Dynamic Monitoring in
Android Things. IEEE Access 5, 6361–6371.
https://doi.org/10.1109/ACCESS.2017.2693388
Diro, A. A., Chilamkurti, N., 2018. Distributed attack
detection scheme using deep learning approach for
Internet of Things. Future Generation Computer
Systems 82, 761–768. https://doi.org/10.1016/j.future.
2017.08.043
Domb, M., Bonchek-Dokow, E., Leshem, G., 2017.
Lightweight adaptive Random-Forest for IoT rule
generation and execution. Journal of Information
Security and Applications 34, 218–224. https://
doi.org/10.1016/j.jisa.2017.03.001
Gao, S., Thamilarasu, G., 2017. Machine-Learning
Classifiers for Security in Connected Medical Devices,
in: 2017 26th International Conference on Computer
Communication and Networks (ICCCN). Presented at
the 2017 26th International Conference on Computer
Communication and Networks (ICCCN), IEEE,
Vancouver, BC, Canada, pp. 1–5. https://doi.org/
10.1109/ICCCN.2017.8038507
Gebrie, M. T., Abie, H., 2017. Risk-based adaptive
authentication for internet of things in smart home
eHealth, in: ECSA ’17 Proceedings of the 11th
European Conference on Software Architecture:
Companion Proceedings. Presented at the ECSA ’17
Proceedings of the 11th European Conference on
Software Architecture: Companion Proceedings, ACM
Press, Canterbury, United Kingdom, pp. 102–108.
https://doi.org/10.1145/3129790.3129801
Indre, I., Lemnaru, C., 2016. Detection and prevention
system against cyber attacks and botnet malware for
information systems and Internet of Things, in: 2016
IEEE 12th International Conference on Intelligent