Please use this identifier to cite or link to this item:
https://hdl.handle.net/11499/52866
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gurbuz, E. | - |
dc.contributor.author | Turgut, O. | - |
dc.contributor.author | Kok, I. | - |
dc.date.accessioned | 2023-10-27T07:08:35Z | - |
dc.date.available | 2023-10-27T07:08:35Z | - |
dc.date.issued | 2023 | - |
dc.identifier.isbn | 9798350302523 | - |
dc.identifier.uri | https://doi.org/10.1109/SmartNets58706.2023.10215896 | - |
dc.identifier.uri | https://hdl.handle.net/11499/52866 | - |
dc.description | Aselsan;CIS ARGE;Yeditepe University | en_US |
dc.description | 2023 International Conference on Smart Applications, Communications and Networking, SmartNets 2023 - 25 July 2023 through 27 July 2023 -- 191902 | en_US |
dc.description.abstract | In recent years, there has been a surge in IoT healthcare applications, ranging from wearable health monitors and remote patient monitoring systems to smart medical devices, telemedicine platforms, and personalized health tracking and management tools. The purpose of these applications is to improve treatment outcomes, streamline healthcare delivery, and enable data-driven decision-making. However, due to the sensitive nature of health data and the critical role that these applications play in people's lives, ensuring their security and privacy has become a paramount concern. To address this issue, we developed an explainable malicious traffic detection and monitoring system based on Machine Learning (ML) and Deep Learning (DL) models. The proposed system involves the use of Explainable Artificial Intelligence (XAI) methods such as LIME, SHAP, ELI5, and Integrated Gradients(IG) to ensure the interpretability and explainability of the developed models. Finally, we demonstrate the high accuracy of the developed models in detecting attacks on the intensive care patient dataset. Furthermore, we ensure the transparency and interpretability of the model outcomes by presenting them through the Shapash Monitor interface, which can be easily accessed by both experts and non-experts. © 2023 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | 2023 International Conference on Smart Applications, Communications and Networking, SmartNets 2023 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Explainable Artificial Intelligence(XAI) | en_US |
dc.subject | Healthcare security | en_US |
dc.subject | Internet of Things | en_US |
dc.subject | Interpretable Machine Learning (IML) | en_US |
dc.subject | intrusion detection | en_US |
dc.subject | Behavioral research | en_US |
dc.subject | Decision making | en_US |
dc.subject | Deep learning | en_US |
dc.subject | Health care | en_US |
dc.subject | Intrusion detection | en_US |
dc.subject | Learning systems | en_US |
dc.subject | Lime | en_US |
dc.subject | Remote patient monitoring | en_US |
dc.subject | Sensitive data | en_US |
dc.subject | Developed model | en_US |
dc.subject | Explainable artificial intelligence(XAI) | en_US |
dc.subject | Healthcare security | en_US |
dc.subject | Interpretability | en_US |
dc.subject | Interpretable machine learning | en_US |
dc.subject | Intrusion-Detection | en_US |
dc.subject | Machine-learning | en_US |
dc.subject | Malicious traffic | en_US |
dc.subject | Traffic detection systems | en_US |
dc.subject | Traffic monitoring systems | en_US |
dc.subject | Internet of things | en_US |
dc.title | Explainable AI-Based Malicious Traffic Detection and Monitoring System in Next-Gen IoT Healthcare | en_US |
dc.type | Conference Object | en_US |
dc.department | Pamukkale University | en_US |
dc.identifier.doi | 10.1109/SmartNets58706.2023.10215896 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.authorscopusid | 58572504700 | - |
dc.authorscopusid | 58572456300 | - |
dc.authorscopusid | 57200283688 | - |
dc.identifier.scopus | 2-s2.0-85170638209 | en_US |
dc.institutionauthor | … | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en | - |
crisitem.author.dept | 10.10. Computer Engineering | - |
Appears in Collections: | Mühendislik Fakültesi Koleksiyonu Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
2
checked on Nov 16, 2024
Page view(s)
64
checked on Aug 24, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.