You are on page 1of 4

READING PROCESS WORKSHEET

GED0001
NAME: SECTION: TN13
CLEMENTE, ASSHIA PNEA
JAURIGUE, ANGELINE
ORDOÑO, DAVE ASHLEY
TEXT TITLE: DATE: 01/18/2024
“EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE
ENGINEERING-LESS MACHINE LEARNING”
TEXT TYPE: Scientific Article AUTHOR: Arshiya Khan and Chase Cotton
I. PRE-READING
A. Complete the table with the headings, subheadings, and visuals that can be
seen in the text.
HEADINGS SUBHEADINGS
ABSTRACT 1.
KEYWORDS 2.
2.1. The Advent of 1D-CNN in Malware
1. INTRODUCTION Detection
2. BACKGROUND AND RELATED WORK 2.2. ML Techniques for Malware Detection in
IoT environment
3. METHODOLOGY
3.
4. EVALUATION 3.1. Feature Engineering-Less ML
5. CONCLUSION 3.2. Experimental Design
REFERENCES 3.3. DL Architecture
AUTHORS 4.
4.1. Evaluation Metrics
4.2. Experimental Evaluations
4.3. Comparison with another Dataset
4.4. Applicability in IoT Scenario
VISUALS
VISUALS
B. List down unfamiliar words and words that signal transitions.
Unfamiliar Words Signal Words
1. Contrive 1. However
2. Enormity 2. Therefore
3. Unremitting 3. Consequently
4. Irregularities 4. However
5. Intuitively 5. Ultimately

C. Fill the table with information that you already know about the topic (K), you
wonder about the topic (W), and you will learn after the text (L). Do not fill the
column L yet.
K W L
Understanding of IoT Specific challenges in IoT
devices and their device security
applications.
Basic knowledge of How feature engineering-
common attack vectors in less machine learning can
IoT. be applied to IoT security.
Familiarity with traditional How feature engineering-
feature engineering in less ML differs from
machine learning. traditional approaches.
General understanding of Specific challenges in
efficient methods for attack achieving efficiency in IoT
detection. attack detection

You might also like