A Review of Support Vector Machine-based Intrusion Detection System for Wireless Sensor Network with Different Kernel Functions
暂无分享,去创建一个
[1] Aman Jantan,et al. Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems , 2018, Neural Computing and Applications.
[2] V. Vapnik. The Support Vector Method of Function Estimation , 1998 .
[3] C. Douligeris,et al. Detecting denial of service attacks using emergent self-organizing maps , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[4] Mayank Arya Chandra,et al. Survey on SVM and their application in image classification , 2018 .
[5] M. K. Kavitha Devi,et al. A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks , 2020, Wireless Personal Communications.
[6] Ashwini B. Abhale,et al. Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network , 2020, Optical Memory and Neural Networks.
[7] Kalyani C. Waghmare,et al. Intrusion Detection System Using Data Mining Technique : Support Vector Machine , 2013 .
[8] Sanjay Sharma,et al. Intrusion Detection System: A Review , 2015 .
[9] M. A. Jabbar,et al. Random Forest Modeling for Network Intrusion Detection System , 2016 .
[10] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[11] Zain Anwar Ali,et al. Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions , 2018, J. Comput. Networks Commun..
[12] Rakhi D. Wajgi,et al. Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP'99 IDS Database , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[13] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[14] Risanuri Hidayat,et al. Performance comparison of intrusion detection system based anomaly detection using artificial neural network and support vector machine , 2016 .
[15] Monika Drewnik,et al. SVM Kernel Configuration and Optimization for the Handwritten Digit Recognition , 2017, CISIM.
[16] E. Baraneetharan,et al. Role of Machine Learning Algorithms Intrusion Detection in WSNs: A Survey , 2020, September 2020.
[17] Djallel Eddine Boubiche,et al. Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions , 2020, Wireless Personal Communications.
[18] Mahesh Panchal,et al. A Review on Support Vector Machine for Data Classification , 2012 .
[19] Gulshan Kumar,et al. The use of artificial intelligence based techniques for intrusion detection: a review , 2010, Artificial Intelligence Review.
[20] Eyas El-Qawasmeh,et al. Informatics Engineering and Information Science , 2011 .
[21] Sheldon X.-D. Tan,et al. SVM Based Intrusion Detection Using Nonlinear Scaling Scheme , 2018, 2018 14th IEEE International Conference on Solid-State and Integrated Circuit Technology (ICSICT).
[22] Iftikhar Ahmad,et al. A Review of Classification Approaches Using Support Vector Machine in Intrusion Detection , 2011 .
[23] Shafiullah Khan,et al. Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.
[24] Sergio M. Savaresi,et al. Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.
[25] Manas Ranjan Patra,et al. A Hybrid Intelligent Approach for Network Intrusion Detection , 2012 .
[26] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[27] K. V. N. Sunitha,et al. Anomaly Detection using Feature Selection and SVM Kernel Trick , 2015 .
[28] Xiaomin Zhao,et al. An Analytical Approach to Fast Parameter Selection of Gaussian RBF Kernel for Support Vector Machine , 2015, J. Inf. Sci. Eng..
[29] Muhammad Achirul Nanda,et al. A Comparison Study of Kernel Functions in the Support Vector Machine and Its Application for Termite Detection , 2018, Inf..
[30] Zhong Jin,et al. A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection , 2014, Soft Computing.
[31] Hossein Jadidoleslamy,et al. A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS , 2011 .
[32] K. V. N. Sunitha,et al. Effective discriminant function for intrusion detection using SVM , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[33] Farid García,et al. A comprehensive survey on support vector machine classification: Applications, challenges and trends , 2020, Neurocomputing.
[34] Md. Al Mehedi Hasan,et al. Feature Selection for Intrusion Detection Using Random Forest , 2016 .
[35] Balachandra Muniyal,et al. Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection , 2016 .
[36] Chee Khiang Pang,et al. Classification of Imbalanced Data by Oversampling in Kernel Space of Support Vector Machines , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[37] Dishan Jing,et al. SVM Based Network Intrusion Detection for the UNSW-NB15 Dataset , 2019, 2019 IEEE 13th International Conference on ASIC (ASICON).
[38] Jinoh Kim,et al. A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.
[39] Zuherman Rustam,et al. Comparison between Support Vector Machine and Fuzzy C-Means as Classifier for Intrusion Detection System , 2018, Journal of Physics: Conference Series.
[40] Jugal K. Kalita,et al. Towards an Unsupervised Method for Network Anomaly Detection in Large Datasets , 2014, Comput. Informatics.
[41] Chunyu Wang,et al. RFAmyloid: A Web Server for Predicting Amyloid Proteins , 2018, International journal of molecular sciences.
[42] Dong Seong Kim,et al. Intrusion detection system , 2020, International Journal of Engineering and Techniques.