Detection of the Primary User's Behavior for the Intervention of the Secondary User Using Machine Learning

被引:3
作者
Zambrano Soto, Deisy Dayana [1 ]
Salcedo Parra, Octavio Jose [1 ,2 ]
Lopez Sarmiento, Danilo Alfonso [1 ]
机构
[1] Univ Distrital Francisco Jose de Caldas, Internet Res Grp, Fac Engn, Bogota, Colombia
[2] Univ Nacl Colombia, Fac Engn, Dept Syst & Ind Engn, Bogota, Colombia
来源
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018 | 2018年 / 11251卷
关键词
Cognitive Radio; KNN; LR; Machine learning; Primary users (PU); SVM;
D O I
10.1007/978-3-030-03192-3_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The predictive analysis for the spectral decision with automatic Learning is a task that is currently challenging. Some automatic Learning techniques are shown in order to predict the presence or absence of a primary user (PU) in Cognitive Radio. Four machine learning methods are examined including the K-nearest neighbors (KNN), the support vector machines (SVM), logistic regression (LR) and decision tree (DT) classifiers. These predictive models are built based on data and their performance is compared with the purpose of selecting the best classifier that can predict spectral occupancy.
引用
收藏
页码:200 / 213
页数:14
相关论文
共 50 条
[1]   Machine Learning Based Primary User Emulation Attack Detection [J].
Camana, Mario R. ;
Garcia, Carla E. ;
Koo, Insoo ;
Shakhov, Vladimir .
2022 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2022, :244-248
[2]   Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics [J].
Alshehri, Abdullah ;
Khan, Nayeem ;
Alowayr, Ali ;
Alghamdi, Mohammed Yahya .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (02) :1679-1689
[3]   Detection of Primary User assisted by Machine Learning over Multipath Channels [J].
Bouallegue, Kais ;
Crussiere, Matthieu .
2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, :824-829
[4]   Enhancing IoT Security Through User Categorization and Aberrant Behavior Detection Using RBAC and Machine Learning [J].
Izzeddin, A. O. Alshawwa ;
Bin Yahaya, Nor Adnan ;
Mahmoud, Ahmed Y. .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (12) :638-647
[5]   Efficient Detection of Irrelevant User Reviews Using Machine Learning [J].
Kim, Cheolgi ;
Kim, Hyeon Gyu .
APPLIED SCIENCES-BASEL, 2024, 14 (16)
[6]   Predicting User Behavior in e-Commerce Using Machine Learning [J].
Ketipov, Rumen ;
Angelova, Vera ;
Doukovska, Lyubka ;
Schnalle, Roman .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2023, 23 (03) :89-101
[7]   Identifying User Behavior Profiles in Ethereum Using Machine Learning Techniques [J].
Valadares, Julia Almeida ;
Oliveira, Vinicius C. ;
de Azevedo Sousa, Jose Eduardo ;
Bernardino, Heder S. ;
Villela, Saulo Moraes ;
Vieira, Alex Borges ;
Goncalves, Glauber .
2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2021), 2021, :327-332
[8]   Machine Learning Based Detection of Anomalous User Behavior in University Data Centers [J].
Kotenko, Igor ;
Saenko, Igor ;
Zelichenok, Igor .
EUROPEAN JOURNAL ON ARTIFICIAL INTELLIGENCE, 2025,
[9]   Machine Learning Based Detection of Anomalous User Behavior in University Data Centers [J].
Kotenko, Igor ;
Saenko, Igor ;
Zelichenok, Igor .
EUROPEAN JOURNAL ON ARTIFICIAL INTELLIGENCE, 2025,
[10]   A network user's abnormal behavior detection approach based on selective collaborative learning [J].
Lu, You ;
Li, Wei ;
Luo, Jun-Zhou ;
Jiang, Jian ;
Xia, Nu .
Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (01) :28-40