Acknowledgement
본 논문은 2024 년도 산업통상자원부 및 한국산업기술진흥원의 산업혁신인재성장지원사업 (RS-2024-00415520)과 과학기술정보통신부 및 정보통신기획평가원의 ICT 혁신인재 4.0 사업의 연구결과로 수행되었음 (No. IITP-2022-RS-2022-00156310)
References
- Yaacoub, J-P.A et al., "Ethical hacking for IoT: Security issues, challenges, solutions and recommendations," in Internet of Things and Cyber-Physical Systems, vol. 3, pp. 280-308, 2023. https://doi.org/10.1016/j.iotcps.2023.04.002
- Sarhan, M et al., "Feature extraction for machine learning-based intrusion detection in IoT networks," in Digital Communications and Networks, vol. 10, 1, pp. 205-216, 2024.
- Alaghbari, K.A et al., " Deep Autoencoder-Based Integrated Model for Anomaly Detection and Efficient Feature Extraction," in IoT Networks, vol. 4, 3, pp. 345-365, 2023. https://doi.org/10.3390/iot4030016
- Correa, J.D.A et al., "Lossy Data Compression for IoT Sensors: A Review," in Internet of Things, vol. 19, pp. 100516, 2022.
- Hafeez et al., "Using Dynamic Perceptually Important Points for Data Reduction in IoT," in Proceedings of the 11th International Conference on the Internet of Things, New York, pp. 33-39, 2022.