Table 1.
Ref. | Approach | Description | Privacy |
---|---|---|---|
[33] | CNN ResNet model | Transformed network traffic data into images for DoS/DDoS detection | No |
[34] | Radio-based RF jamming mitigation | Utilized programmable beam-steering antennas for real-time jammer categorization | No |
[35] | UNSW-NB15 data analysis | Investigated flow, MQTT, and TCP feature clusters | No |
[36] | Machine learning algorithms | Evaluated nine ML algorithms for IoT malware identification | No |
[37] | Simulation-based approach | Generated artificial training data for SVM classifiers | No |