Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/654
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSridhar, T-
dc.date.accessioned2023-05-18T09:19:50Z-
dc.date.available2023-05-18T09:19:50Z-
dc.date.issued2022-12-09-
dc.identifier.issn2147-6799-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/654-
dc.description.abstractInternet of Things (IoT) exhibits a significant role to evaluate the error or supply shortage. The IoT demand for the security and authentication of the devices is considered as the most priority for software developments. As the IoT communication comprises of an interconnected environment for the both digital and physical scenarios. The IoT environment exhibits anything and anywhere services to the communication medium. In those scenarios, security is considered as the major concern to protect the data resources from unauthorized resources for the appropriate security and privacy. This paper proposed a decision tree-based pruning scheme for the IoT attributes. The proposed decision tree based pruning for the security attributes are defined as the decision tree pruning (DTP). The proposed DTP model comprises of the minority oversampling model for the estimation of the attack features. With the developed DTP model, the attack datasets were pre-processed and evaluated for the different attack environments in to consideration. The DTP processed data were applied over the conventional machine learning-based model for the computation attacks in the network. The simulation results expressed that proposed DTP model achieves the accuracy value of 98% which is ~3% higher than the conventional classifier techniques.en_US
dc.language.isoenen_US
dc.publisherIJISAEen_US
dc.subjectPruning, Decision Treeen_US
dc.subjectOversampling Modelen_US
dc.subjectInternet of Things (IoT)en_US
dc.subjectSecurityen_US
dc.titleDecision Tree Based Data Pruning with the Estimation of Oversampling Attributes for the Secure Communication in IOTen_US
dc.typeArticleen_US
Appears in Collections:Journal Articles

Files in This Item:
File Description SizeFormat 
document.pdf
  Restricted Access
254.68 kBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.