Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An information security analysis method of Internet of things based on balanced double SVM

View through CrossRef
With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems emerge in endlessly. During the period of COVID-19, the Internet of Things have been widely used to fight virus outbreak. However, the most serious security problem of the Internet of things is network intrusion. This paper proposes a balanced quadratic support vector machine information security analysis method for Internet of things. Compared with the traditional support vector machine Internet of things security analysis method, this method has a higher accuracy, and can shorten the detection time, with efficient and powerful characteristics. The method proposed in this paper has certain reference value to the Internet of things network intrusion problem. It provides better security for the Internet of things during the protection period of covid-19.
Title: An information security analysis method of Internet of things based on balanced double SVM
Description:
With the continuous progress of social science and technology, the development of the Internet of things is growing.
With the development of Internet of things, security problems emerge in endlessly.
During the period of COVID-19, the Internet of Things have been widely used to fight virus outbreak.
However, the most serious security problem of the Internet of things is network intrusion.
This paper proposes a balanced quadratic support vector machine information security analysis method for Internet of things.
Compared with the traditional support vector machine Internet of things security analysis method, this method has a higher accuracy, and can shorten the detection time, with efficient and powerful characteristics.
The method proposed in this paper has certain reference value to the Internet of things network intrusion problem.
It provides better security for the Internet of things during the protection period of covid-19.

Related Results

The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...
Soil Moisture Content Prediction Model for Tea Plantations Based on a Wireless Sensor Network
Soil Moisture Content Prediction Model for Tea Plantations Based on a Wireless Sensor Network
<p>Suitable soil moisture content (SMC) can not only increase the ability of tea tree roots to absorb and utilize nutrients but also improve the utilization rate of soil nutr...
Accuracy and Value of Time-resolved MRA for Spinal Vascular Malformations
Accuracy and Value of Time-resolved MRA for Spinal Vascular Malformations
Study Design. Retrospective. Objective. To explore the value of time-resolved CE-MRA in evaluating and locating the SVM be...
Analisis Sentimen Layanan Pelanggan Provider Internet dengan Algoritma Support Vector Machine dan Naïve Bayes
Analisis Sentimen Layanan Pelanggan Provider Internet dengan Algoritma Support Vector Machine dan Naïve Bayes
Meningkatnya keluhan dan pujian pelanggan terhadap layanan internet menunjukkan pentingnya memahami opini publik secara menyeluruh. Jika hal ini tidak dimanfaatkan dengan baik, per...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...

Back to Top