{"id":2146,"date":"2023-03-28T11:49:56","date_gmt":"2023-03-28T14:49:56","guid":{"rendered":"https:\/\/sbrc.sbc.org.br\/2023\/?page_id=2146"},"modified":"2023-03-28T11:58:54","modified_gmt":"2023-03-28T14:58:54","slug":"minicurso3","status":"publish","type":"page","link":"https:\/\/sbrc.sbc.org.br\/2023\/minicurso3\/","title":{"rendered":"Minicurso 3"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">T\u00edtulo: Intrusion detection with Machine Learning in Internet of Things and Fog Computing: problems, solutions and research<\/h3>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Resumo:<\/strong><\/p>\n\n\n\n<p>Intrusion detection is one of the key points in computer security, and it aims to identify attempted attacks by unauthorized users. Several researches are being developed to solve security problems in environments involving the Internet of Things, Fog Computing, and Cloud Computing. This mini-course has a theoretical and practical profile, aims to describe aspects of the context of intrusion detection in IoT and Fog Computing, presents Machine Learning techniques commonly used in intrusion detection, expose state-of-the-art approaches, and present some results obtained in developed research.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Autores:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cristiano Antonio Souza &#8211; UFSC<\/li>\n\n\n\n<li>Carlos Becker Westphall &#8211; UFSC<\/li>\n\n\n\n<li>Renato Machado &#8211; UNIOESTE<\/li>\n<\/ul>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>T\u00edtulo: Intrusion detection with Machine Learning in Internet of Things and Fog Computing: problems, solutions and research Resumo: Intrusion detection is one of the key points in computer security, and it aims to identify attempted attacks by unauthorized users. Several researches are being developed to solve security problems in environments involving the Internet of Things, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2146","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sbrc.sbc.org.br\/2023\/wp-json\/wp\/v2\/pages\/2146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sbrc.sbc.org.br\/2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sbrc.sbc.org.br\/2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sbrc.sbc.org.br\/2023\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sbrc.sbc.org.br\/2023\/wp-json\/wp\/v2\/comments?post=2146"}],"version-history":[{"count":3,"href":"https:\/\/sbrc.sbc.org.br\/2023\/wp-json\/wp\/v2\/pages\/2146\/revisions"}],"predecessor-version":[{"id":2155,"href":"https:\/\/sbrc.sbc.org.br\/2023\/wp-json\/wp\/v2\/pages\/2146\/revisions\/2155"}],"wp:attachment":[{"href":"https:\/\/sbrc.sbc.org.br\/2023\/wp-json\/wp\/v2\/media?parent=2146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}