M.S. Applied Data Science - Capstone Chronicles 2025
23
Medium. https://medium.com/@mohtasim.hossain 2000/mastering-lightgbm-an-in-depth-gui de-to-efficient-gradient-boosting-8bfeff15 ee17 Mozzillo, A., Zecchini, L., Gagliardelli, L., Aslam, A., Bergamaschi, S., & Simonini, G. (2023). Evaluation of Dataframe Libraries for Data Preparation on a Single Machine . Ogrizović, M., Drašković, D., & Bojić, D. (2024). Quality assurance strategies for machine learning applications in big data analytics: an overview. Journal of Big Data , 11 (1). https://doi.org/10.1186/s40537-024-01028 -y Neto, C., Sajjad Dadkhah, Ferreira, R., Alireza Zohourian, Lu, R., & Ghorbani, A. A. (2023). CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment. Sensors 2023 , 23 (13), 5941–5941. https://doi.org/10.3390/s23135941 Polat, O., Ayid Ahmad, A., Oyucu, S., Algül, E., Doğan, F., & Aksöz, A. (2025).
Temporal-Spatial Feature Extraction in IoT-Based SCADA System Security: Hybrid CNN-LSTM and Attention-Based Architectures for Malware Classification and Attack Detection. IEEE Access , 13 , 102109–102132. https://doi.org/10.1109/access.2025.3577 761 Rabbani, M., Gui, J., Fatemeh Nejati, Zhou, Z., Arun Kaniyamattam, Mirani, M., Gunjan Piya, Igor Opushnyev, Lu, R., & Ghorbani, A. A. (2024). Device Identification and Anomaly Detection in IoT Environments. IEEE Internet of Things Journal , 1–1. https://doi.org/10.1109/jiot.2024.3522863 Rahm, E., & Do, H. (2000). Data Cleaning: Problems and Current Approaches . Ranpara, R., Patel, S. K., Kumar, O. P., & Al-Zahrani, F. A. (2025). A computational framework for IoT security integrating deep learning-based semantic algorithms for real-time threat response. Scientific Reports , 15 (1).
261
Made with FlippingBook flipbook maker