Please use this identifier to cite or link to this item:
https://scidar.kg.ac.rs/handle/123456789/22667Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Franc, Igor | - |
| dc.contributor.author | Maček, Nemanja | - |
| dc.contributor.author | Bogdanoski, Mitko | - |
| dc.contributor.author | Mirković, Aleksandar | - |
| dc.contributor.author | Đokić, Dragan | - |
| dc.date.accessioned | 2025-11-06T11:28:46Z | - |
| dc.date.available | 2025-11-06T11:28:46Z | - |
| dc.date.issued | 2016 | - |
| dc.identifier.isbn | 978-86-89755-10-7 | en_US |
| dc.identifier.uri | https://scidar.kg.ac.rs/handle/123456789/22667 | - |
| dc.description.abstract | Anomalies in IoT typically occur as a result of malicious activity. As an example, a point anomaly may occur once network intrusion is attempted, while collective anomaly may result from device being hacked. Due to the nature of the attacks, some anomalies are represented by incomplete captured instances or imbalanced captured datasets. For example, features may have some values missing from the row or may contain both categorical and numerical values. Once pre-processed, these datasets become suitable training sets for any machine learning classifier that detects anomalies. However, there are situations where pre-processing takes large amount of time in the operating phase or simply is not executable due to the nature of the data. For example, a feature that contains unknown number of categorical values, such as strings, cannot be converted into finite number of binary features before the training. In this scenarios, basic machine learning methods, such as Support Vector Machines or Decision Trees either fail to operate or provide poor classification performance. Unlike basic, ensemble learners manage these data instances efficiently and provide good anomaly detection rates. This paper analyses the performance of ensemble learners on incomplete IoT intrusion datasets, represented by point anomalies. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Belgrade Metropolitan University | en_US |
| dc.subject | Datasets | en_US |
| dc.subject | Anomaly | en_US |
| dc.subject | Ensemble | en_US |
| dc.subject | Boosting | en_US |
| dc.subject | GentleBoost | en_US |
| dc.title | Detecting Malicious Anomalies in IoT: Ensemble Learners and Incomplete Datasets | en_US |
| dc.title.alternative | Detekcija anomalija u IoT okruzenju sa nekompletnim datasetovima | en_US |
| dc.type | conferenceObject | en_US |
| dc.description.version | Published | en_US |
| dc.type.version | PublishedVersion | en_US |
| dc.source.conference | The Eighth International Conference on Business Information Security (BISEC-2016), 15th October 2016, Belgrade, Serbia | en_US |
| Appears in Collections: | Faculty of Mechanical and Civil Engineering, Kraljevo | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Detecting Malicious Anomalies in IoT: Ensemble Learners and Incomplete Datasets.pdf | 247.04 kB | Adobe PDF | ![]() View/Open |
Items in SCIDAR are protected by copyright, with all rights reserved, unless otherwise indicated.

