[1] B. Kaur and V. Dhir, “Internet of things: Vision, challenges and future scope,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, pp. 40–43, 2017.
[2] T. Fougeroux, A. Douyere, P. O. L. de Peslouan, N. Murad, S. Oree, and J.-L. Dubard, “Circuit Model of Rectennas Array for Estimating Microwave Energy Harvesting in Presence of Mutual Coupling Between Elements,” in 10ième Journées Nationales sur la Récupération et le Stockage de l’Energie (JNRSE 2021), 2021, p. 2.
[3] “Internet of Things Report.” https://www.businessinsider.com/internet-of-things-report (accessed Nov. 13, 2021).
[4] “Things just got real: 61% of businesses already use IoT platforms despite security risks | Kaspersky.” https://www.kaspersky.com/about/press-releases/2020_things-just-got-real-61-of-businesses-already-use-iot-platforms-despite-security-risks (accessed Nov. 13, 2021).
[5] J. Deogirikar and A. Vidhate, “Security attacks in IoT: A survey,” in 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017, pp. 32–37.
[6] C. McCormack, “Five stages of a web malware attack.” Abingdon. Retrieved from https://www. sophos. com/en-us/medialibrary/Gated …, 2016.
[7] A. Kumar and T. J. Lim, “EDIMA: early detection of IoT malware network activity using machine learning techniques,” in 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 2019, pp. 289–294.
[8] I. Hafeez, M. Antikainen, A. Y. Ding, and S. Tarkoma, “IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge,” IEEE Trans. Netw. Serv. Manag., vol. 17, no. 1, pp. 45–59, 2020.
[9] A. Sivanathan, “Iot behavioral monitoring via network traffic analysis,” arXiv Prepr. arXiv2001.10632, 2020.
[10] A. Kumar and T. J. Lim, “Early detection of Mirai-like IoT bots in large-scale networks through sub-sampled packet traffic analysis,” in Future of Information and Communication Conference, 2019, pp. 847–867.
[11] B. Wang, Y. Dou, Y. Sang, Y. Zhang, and J. Huang, “IoTCMal: Towards a hybrid IoT honeypot for capturing and analyzing malware,” in ICC 2020-2020 IEEE International Conference on Communications (ICC), 2020, pp. 1–7.
[12] O. I. Abiodun, A. Jantan, A. E. Omolara, K. V. Dada, N. A. Mohamed, and H. Arshad, “State-of-the-art in artificial neural network applications: A survey,” Heliyon, vol. 4, no. 11, p. e00938, 2018.
[13] S. Chatterjee, S. Sarkar, S. Hore, N. Dey, A. S. Ashour, and V. E. Balas, “Particle swarm optimization trained neural network for structural failure prediction of multistoried RC buildings,” Neural Comput. Appl., vol. 28, no. 8, pp. 2005–2016, 2017.
[14] M. Skowron, M. Wolkiewicz, T. Orlowska-Kowalska, and C. T. Kowalski, “Effectiveness of selected neural network structures based on axial flux analysis in stator and rotor winding incipient fault detection of inverter-fed induction motors,” Energies, vol. 12, no. 12, p. 2392, 2019.
[15] Q. Li et al., “A Novel High-Speed and High-Accuracy Mathematical Modeling Method of Complex MEMS Resonator Structures Based on the Multilayer Perceptron Neural Network,” Micromachines, vol. 12, no. 11, p. 1313, 2021.
[16] U. Orhan, M. Hekim, and M. Ozer, “EEG signals classification using the K-means clustering and a multilayer perceptron neural network model,” Expert Syst. Appl., vol. 38, no. 10, pp. 13475–13481, 2011.
[17] W. Hardy, L. Chen, S. Hou, Y. Ye, and X. Li, “DL4MD: A deep learning framework for intelligent malware detection,” in Proceedings of the International Conference on Data Science (ICDATA), 2016, p. 61.
[18] D. Utomo, “Stock price prediction using back propagation neural network based on gradient descent with momentum and adaptive learning rate,” J. Internet Bank. Commer., vol. 22, no. 3, pp. 1–16, 2017.
[19] A. Qayyum, S. M. Anwar, M. Awais, and M. Majid, “Medical image retrieval using deep convolutional neural network,” Neurocomputing, vol. 266, pp. 8–20, 2017.
[20] mohammadreza mohammadrezaei, “Detecting Fake Accounts on Social networks using Principal Components Analysis and Algorithm Kernel Density Estimation (A case study on the Twitter social network),” Electron. Cyber Def., 2021, [Online]. Available: https://ecdj.ihu.ac.ir/article_205996.html
[21] M. Karami and M. Mosleh, “Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm,” Electron. Cyber Def., vol. 9, no. 2, pp. 9–16, 2021, [Online]. Available: https://ecdj.ihu.ac.ir/article_205749.html
[22] K. D. T. Nguyen, T. M. Tuan, S. H. Le, A. P. Viet, M. Ogawa, and N. Le Minh, “Comparison of three deep learning-based approaches for IoT malware detection,” in 2018 10th international conference on Knowledge and Systems Engineering (KSE), 2018, pp. 382–388.
[23] S. Baek, J. Jeon, B. Jeong, and Y.-S. Jeong, “Two-stage hybrid malware detection using deep learning,” Human-centric Comput. Inf. Sci., vol. 11, no. 27, pp. 10–22967, 2021.
[24] A. Azmoodeh, A. Dehghantanha, and K.-K. R. Choo, “Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning,” IEEE Trans. Sustain. Comput., vol. 4, no. 1, pp. 88–95, 2018.
[25] H. Yu, D. C. Samuels, Y. Zhao, and Y. Guo, “Architectures and accuracy of artificial neural network for disease classification from omics data,” BMC Genomics, vol. 20, no. 1, pp. 1–12, 2019.
[26] S. Ni, Q. Qian, and R. Zhang, “Malware identification using visualization images and deep learning,” Comput. Secur., vol. 77, pp. 871–885, 2018.
[27] S. Arvinth, A. Balakrishnan, M. Harikrishnan, and J. Jeydheepan, “WEED DETECTION USING CONVOLUTION NEURAL NETWORK”, 2021.
[28] V. Sze, Y.-H. Chen, T.-J. Yang, and J. S. Emer, “Efficient processing of deep neural networks: A tutorial and survey,” Proc. IEEE, vol. 105, no. 12, pp. 2295–2329, 2017.
[29] D. Perna, “Convolutional neural networks learning from respiratory data,” in 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2018, pp. 2109–2113.
[30] C. Modarres, N. Astorga, E. L. Droguett, and V. Meruane, “Convolutional neural networks for automated damage recognition and damage type identification,” Struct. Control Heal. Monit., vol. 25, no. 10, p. e2230, 2018.
[31] A. Wani and S. Revathi, “Ransomware protection in loT using software defined networking,” Int. J. Electr. Comput. Eng., vol. 10, no. 3, pp. 3166–3175, 2020.
[32] N. Guizani and A. Ghafoor, “A network function virtualization system for detecting malware in large IoT based networks,” IEEE J. Sel. Areas Commun., vol. 38, no. 6, pp. 1218–1228, 2020.
[33] “The Bot-IoT Dataset | UNSW Research.” https://research.unsw.edu.au/projects/bot-iot-dataset (accessed Nov. 13, 2021).
[34] T. N. Phu, K. H. Dang, D. N. Quoc, N. T. Dai, and N. N. Binh, “A novel framework to classify malware in mips architecture-based iot devices,” Secur. Commun. Networks, vol. 2019, 2019.
[35] F. Ding et al., “DeepPower: Non-intrusive and deep learning-based detection of IoT malware using power side channels,” in Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, 2020, pp. 33–46.
[36] S. Elhadi, A. Marzak, N. Sael, and S. Merzouk, “Comparative study of IoT protocols,” Smart Appl. Data Anal. Smart Cities, 2018.
[37] S. Zamfir, T. Balan, I. Iliescu, and F. Sandu, “A security analysis on standard IoT protocols,” in 2016 international conference on applied and theoretical electricity (ICATE), 2016, pp. 1–6.
[38] A. Parmisano, S. Garcia, and M. J. Erquiaga, “A labeled dataset with malicious and benign iot network traffic,” Stratos. Lab. Praha, Czech Repub., 2020.
[39] M. Toğaçar, B. Ergen, and Z. Cömert, “Detection of lung cancer on chest CT images using minimum redundancy maximum relevance feature selection method with convolutional neural networks,” Biocybern. Biomed. Eng., vol. 40, no. 1, pp. 23–39, 2020.