A Novel Intrusion Detection Approach Using Machine Learning Ensemble for IoT Environments
暂无分享,去创建一个
Parag Verma | A. Dumka | Alaknanda Ashok | Rajesh Singh | A. Gehlot | P. Malik | G. S. Gaba | Mustapha Hedabou | Anita Gehlot
[1] Bayu Adhi Tama,et al. An in-depth experimental study of anomaly detection using gradient boosted machine , 2019, Neural Computing and Applications.
[2] Ehsan Namjoo,et al. LR-HIDS: logistic regression host-based intrusion detection system for cloud environments , 2018, Journal of Ambient Intelligence and Humanized Computing.
[3] Lior Rokach,et al. Ensemble learning: A survey , 2018, WIREs Data Mining Knowl. Discov..
[4] João Gama,et al. Ensemble learning for data stream analysis: A survey , 2017, Inf. Fusion.
[5] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[6] Gilles Louppe,et al. Understanding variable importances in forests of randomized trees , 2013, NIPS.
[7] A. Staiano,et al. Machine learning and soft computing for ICT security: an overview of current trends , 2013, J. Ambient Intell. Humaniz. Comput..
[8] Kim-Kwang Raymond Choo. The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..
[9] Alan L. Yuille,et al. Performance comparison of machine learning algorithms and number of independent components used in fMRI decoding of belief vs. disbelief , 2011, NeuroImage.
[10] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[11] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[12] Mohanad Sarhan,et al. Towards a Standard Feature Set of NIDS Datasets , 2021, ArXiv.
[13] Gurjot Singh Gaba,et al. Secure Device-to-Device communications for 5G enabled Internet of Things applications , 2021, Comput. Commun..
[14] Ravindra C. Thool,et al. Intrusion Detection System Using Bagging with Partial Decision TreeBase Classifier , 2015 .
[15] Tsung-Han Lee,et al. A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN , 2013, EMC/HumanCom.
[16] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[17] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..