ACKNOWLEDGEMENTS 
This work has been fully supported by the Croatian 
Science Foundation under the project IP-2014-09-
3877. 
REFERENCES 
Abeshu, A., Chilamkurti, N., 2018. Deep Learning: The 
Frontier for Distributed Attack Detection in Fog-to-
Things Computing. IEEE Communications Magazine 
56, 169–175. https://doi.org/10.1109/MCOM.2018. 
1700332 
Agatonovic-Kustrin, S., Beresford, R., 2000. Basic 
concepts of artificial neural network (ANN) modeling 
and its application in pharmaceutical research. Journal 
of Pharmaceutical and Biomedical Analysis 22, 717–
727. https://doi.org/10.1016/S0731-7085(99)00272-1 
Ahmed, M.E., Kim, H., Park, M., 2017. Mitigating DNS 
query-based DDoS attacks with machine learning on 
software-defined networking, in: MILCOM 2017 - 
2017 IEEE Military Communications Conference 
(MILCOM). Presented at the MILCOM 2017 - 2017 
IEEE Military Communications Conference 
(MILCOM), IEEE, Baltimore, MD, USA, pp. 11–16. 
https://doi.org/10.1109/MILCOM.2017.8170802 
Ali, T., Nauman, M., Jan, S., 2018. Trust in IoT: dynamic 
remote attestation through efficient behavior capture. 
Cluster Computing 21, 409–421. https://doi.org/ 
10.1007/s10586-017-0877-5 
Aminanto, M. E., Choi, R., Tanuwidjaja, H. C., Yoo, P. 
D., Kim, K., 2018. Deep Abstraction and Weighted 
Feature Selection for Wi-Fi Impersonation Detection. 
IEEE Transactions on Information Forensics and 
Security 13, 621–636. https://doi.org/10.1109/TIFS. 
2017.2762828 
Aminanto, M. E., Tanuwidjaja, H. C., Yoo, P. D., Kim, 
K., 2017. Wi-Fi intrusion detection using weighted-
feature selection for neural networks classifier, in: 
2017 International Workshop on Big Data and 
Information Security (IWBIS). Presented at the 2017 
International Workshop on Big Data and Information 
Security (IWBIS), IEEE, Jakarta, Indonesia, pp. 99–
104. https://doi.org/10.1109/IWBIS.2017.8275109 
Amor, N. B., Benferhat, S., Elouedi, Z., 2004. Naive 
Bayes vs decision trees in intrusion detection systems. 
ACM Press, p. 420. https://doi.org/10.1145/967900. 
967989 
Baldini, G., Giuliani, R., Steri, G., Neisse, R., 2017a. 
Physical layer authentication of Internet of Things 
wireless devices through permutation and dispersion 
entropy, in: 2017 Global Internet of Things Summit 
(GIoTS). Presented at the 2017 Global Internet of 
Things Summit (GIoTS), IEEE, Geneva, Switzerland, 
pp. 1–6. https://doi.org/10.1109/GIOTS.2017.8016272 
Baldini, G., Steri, G., Giuliani, R., Gentile, C., 2017b. 
Imaging time series for internet of things radio 
frequency fingerprinting, in: 2017 International 
Carnahan Conference on Security Technology 
(ICCST). Presented at the 2017 International 
Carnahan Conference on Security Technology 
(ICCST), IEEE, Madrid, Spain, pp. 1–6. 
https://doi.org/10.1109/CCST.2017.8167861 
Bhunia, S.S., Gurusamy, M., 2017. Dynamic attack 
detection and mitigation in IoT using SDN, in: 2017 
27th International Telecommunication Networks and 
Applications Conference (ITNAC). Presented at the 
2017 27th International Telecommunication Networks 
and Applications Conference (ITNAC), IEEE, 
Melbourne, VIC, Australia, pp. 1–6. https://doi.org/ 
10.1109/ATNAC.2017.8215418 
Canedo, J., Skjellum, A., 2016. Using machine learning to 
secure IoT systems, in: 2016 14th Annual Conference 
on Privacy, Security and Trust (PST). Presented at the 
2016 14th Annual Conference on Privacy, Security 
and Trust (PST), IEEE, Auckland, New Zealand, pp. 
219–222. https://doi.org/10.1109/PST.2016.7906930 
Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A.V., 
Rong, X., 2015. Data Mining for the Internet of 
Things: Literature Review and Challenges. 
International Journal of Distributed Sensor Networks 
11, 431047. https://doi.org/10.1155/2015/431047 
Cho, T., Kim, H., Yi, J.H., 2017. Security Assessment of 
Code Obfuscation Based on Dynamic Monitoring in 
Android Things. IEEE Access 5, 6361–6371. 
https://doi.org/10.1109/ACCESS.2017.2693388 
Diro, A. A., Chilamkurti, N., 2018. Distributed attack 
detection scheme using deep learning approach for 
Internet of Things. Future Generation Computer 
Systems 82, 761–768. https://doi.org/10.1016/j.future. 
2017.08.043 
Domb, M., Bonchek-Dokow, E., Leshem, G., 2017. 
Lightweight adaptive Random-Forest for IoT rule 
generation and execution. Journal of Information 
Security and Applications 34, 218–224. https:// 
doi.org/10.1016/j.jisa.2017.03.001 
Gao, S., Thamilarasu, G., 2017. Machine-Learning 
Classifiers for Security in Connected Medical Devices, 
in: 2017 26th International Conference on Computer 
Communication and Networks (ICCCN). Presented at 
the 2017 26th International Conference on Computer 
Communication and Networks (ICCCN), IEEE, 
Vancouver, BC, Canada, pp. 1–5. https://doi.org/ 
10.1109/ICCCN.2017.8038507 
Gebrie, M. T., Abie, H., 2017. Risk-based adaptive 
authentication for internet of things in smart home 
eHealth, in: ECSA ’17 Proceedings of the 11th 
European Conference on Software Architecture: 
Companion Proceedings. Presented at the ECSA ’17 
Proceedings of the 11th European Conference on 
Software Architecture: Companion Proceedings, ACM 
Press, Canterbury, United Kingdom, pp. 102–108. 
https://doi.org/10.1145/3129790.3129801 
Indre, I., Lemnaru, C., 2016. Detection and prevention 
system against cyber attacks and botnet malware for 
information systems and Internet of Things, in: 2016 
IEEE 12th International Conference on Intelligent