scholarly journals Machine Learning Using Big Data Link Stability Based Node Observation for IoT Security

2021 ◽  
Author(s):  
R. Ganesh Babu ◽  
S. Yuvaraj ◽  
A. VedanthSrivatson ◽  
T. Ramachandran ◽  
G. Vikram ◽  
...  

IoT systems create a multi-hop organizational structure among mobile devices in required to send on data groups. The remarkable properties of gadgets frameworks cause communications to interconnect among competing handheld devices. Most physiological directing displays don’t believe secure associations all through bundle communication to organize high communicate ability and genetic blocks that also prompts increased delay as well as bundle decreasing in mastermind. Only with continued growth and transformation of IoT networks, attacks on such IoT systems are increasing at an alarming rate. Our purpose will provide researchers with a research resource on latest research patterns in IoT security. As the primary driver of with us research problem concerning IoT security as well as machine learning. This analysis of the literature among the most research literature in IoT security recognized some very key current research which will generate organizational investigations. Only with fast emergence of different IoT threats, it is essential to develop frameworks that could integrate cutting-edge big data analytics and machine learning advanced technologies. Effectiveness are critical quality variables in shaping the best methods and algorithms for detecting IoT threats in real-time or close to real time.

2020 ◽  
Vol 102 (913) ◽  
pp. 199-234
Author(s):  
Nema Milaninia

AbstractAdvances in mobile phone technology and social media have created a world where the volume of information generated and shared is outpacing the ability of humans to review and use that data. Machine learning (ML) models and “big data” analytical tools have the power to ease that burden by making sense of this information and providing insights that might not otherwise exist. In the context of international criminal and human rights law, ML is being used for a variety of purposes, including to uncover mass graves in Mexico, find evidence of homes and schools destroyed in Darfur, detect fake videos and doctored evidence, predict the outcomes of judicial hearings at the European Court of Human Rights, and gather evidence of war crimes in Syria. ML models are also increasingly being incorporated by States into weapon systems in order to better enable targeting systems to distinguish between civilians, allied soldiers and enemy combatants or even inform decision-making for military attacks.The same technology, however, also comes with significant risks. ML models and big data analytics are highly susceptible to common human biases. As a result of these biases, ML models have the potential to reinforce and even accelerate existing racial, political or gender inequalities, and can also paint a misleading and distorted picture of the facts on the ground. This article discusses how common human biases can impact ML models and big data analytics, and examines what legal implications these biases can have under international criminal law and international humanitarian law.


Sign in / Sign up

Export Citation Format

Share Document