Table 2 Key notations.

From: A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things

Notations

Description

\(\:JH\)

joint entropy

\(\:Q\:\left({d}_{j}\right)\)

System uncertainty

\(\:\text{log}Q\left(u\right)\:\)

Attribute entropy

\(\:{\left|\left|\partial\:\right|\right|}_{M}\)

Objective function

\(\:{\partial\:}_{k}\)

Norm in the given metric

\(\:{\delta\:}_{jk}\)

SVM margin

\(\:M\left(B\right)\)

Optimization landscape

\(\:{B}_{j}{B}_{z}\)

Quadratic interaction term

\(\:\left({z}_{p},{r}_{h}\right)\)

Ideal hyperplane

\(\:{\forall\:}_{1}\left(y\right)\)

Quadratic programming

\(\:R\:\left(\nabla\:\left(u+yt\right)\right)\)

Gradient terms

\(\:\left(\partial\:-{x}_{2}\right)\)

input gradient

\(\:V\left(\:{\partial\:}_{p}\left(y+xt\right)\right)\)

Function featuring

\(\:W\:\left(\varDelta\:\left(y\right)\right)\)

Partial derivative

\(\:{I}^{p}\)

Recursive term

\(\:{E}_{f+gh}\)

Error component

\(\:\forall\:.\:IJ\)

Dynamic process

\(\:H.{s}_{qq}\left(j\right)-S\:\left(j\right)\)

Online risks in IoT contexts

\(\:{\sigma\:}_{k}\:\left(n+1\right)\)

Cyber risks in IoT networks

\(\:{S}_{z+1}\left(j\right)\)

Thresholds

\(\:{P}_{K}\:\left(Y\right)\)

Transfer learning efficiency analysis.