Crow-AFL: Crow Based Adaptive Fractional Lion Optimization Approach for the Intrusion Detection
暂无分享,去创建一个
[1] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[2] Siyang Zhang,et al. A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..
[3] Francesco Sergio Pisani,et al. Evolving meta-ensemble of classifiers for handling incomplete and unbalanced datasets in the cyber security domain , 2016, Appl. Soft Comput..
[4] Vijay Kumar Jha,et al. Fuzzy min–max neural network and particle swarm optimization based intrusion detection system , 2017 .
[5] Hossam Faris,et al. Optimizing connection weights in neural networks using the whale optimization algorithm , 2016, Soft Computing.
[6] Hongyu Yang,et al. Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network , 2019, IEEE Access.
[7] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[8] Samarjeet B. Powalkar,et al. Fast face recognition based on Wavelet Transform on PCA , 2015, 2015 International Conference on Energy Systems and Applications.
[9] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[10] V. S. Shankar Sriram,et al. An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine , 2017, Knowl. Based Syst..
[11] V. M. Thakare,et al. Silhouette based human fall detection using multimodal classifiers for content based video retrieval systems , 2017, 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).
[12] E. Sreenivasa Reddy,et al. FTDT: Rough set integrated functional tangent decision tree for finding the status of aqua pond in aquaculture , 2017, J. Intell. Fuzzy Syst..
[13] Shailendra Singh,et al. An IWD-based feature selection method for intrusion detection system , 2017, Soft Computing.
[14] Alireza Askarzadeh,et al. A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm , 2016 .
[15] Qingsheng Zhu,et al. A novel outlier cluster detection algorithm without top-n parameter , 2017, Knowl. Based Syst..
[16] Jie Gu,et al. An effective intrusion detection framework based on SVM with feature augmentation , 2017, Knowl. Based Syst..
[17] Seyed Mojtaba Hosseini Bamakan,et al. An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016, Neurocomputing.
[18] Mohammad Abdollahi Azgomi,et al. A game-theoretic approach to model and quantify the security of cyber-physical systems , 2017, Comput. Ind..
[19] Sanjay Silakari,et al. A Survey of Cyber Attack Detection Systems , 2009 .
[20] Sanjeev Jain,et al. Implementation of Intrusion Detection System using Adaptive Neuro-Fuzzy Inference System for 5G wireless communication network , 2017 .
[21] P. Vijaya,et al. Multi kernel and dynamic fractional lion optimization algorithm for data clustering , 2017 .
[22] Yongli Zhao,et al. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks , 2017 .
[23] Ing-Ray Chen,et al. On Survivability of Mobile Cyber Physical Systems with Intrusion Detection , 2012, Wireless Personal Communications.
[24] Gholamhossein Dastghaibyfard,et al. Two-tier network anomaly detection model: a machine learning approach , 2017, Journal of Intelligent Information Systems.
[25] Li Jing,et al. Network Intrusion Detection Method Based on Relevance Deep Learning , 2016, 2016 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS).
[26] Kamel Adi,et al. An auto-learning approach for network intrusion detection , 2018, Telecommun. Syst..
[27] Kannapiran Balasubramanian,et al. A Novel LWCSO-PKM-Based Feature Optimization and Classification of Attack Types in SCADA Network , 2017, Arabian Journal for Science and Engineering.
[28] Dechang Pi,et al. HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems , 2019, IEEE Access.
[29] Cleotilde Gonzalez,et al. Effects of cyber security knowledge on attack detection , 2015, Comput. Hum. Behav..
[30] Jong Hyuk Park,et al. DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks , 2015, The Journal of Supercomputing.
[31] V. S. Shankar Sriram,et al. A Hypergraph and Arithmetic Residue-based Probabilistic Neural Network for classification in Intrusion Detection Systems , 2017, Neural Networks.
[32] Young B. Moon,et al. Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods , 2017, Journal of Intelligent Manufacturing.