An Improved Intrusion Detection System to Preserve Security in Cloud Environment
暂无分享,去创建一个
Santanu Phadikar | Partha Ghosh | Sumit Biswas | Shivam Shakti | S. Biswas | S. Phadikar | S. Shakti | Partha Ghosh
[1] Norbik Bashah Idris,et al. A brief introduction to intrusion detection system , 2012, ICRA 2012.
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] Fatos Xhafa,et al. Inter-cooperative Collective Intelligence: Techniques and Applications , 2013 .
[4] Arputharaj Kannan,et al. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.
[5] Jiankun Hu,et al. Host-Based Anomaly Intrusion Detection , 2010, Handbook of Information and Communication Security.
[6] Vimal Kumar Dubey,et al. A cluster-filter feature selection approach , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[7] A. Damodaram,et al. Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K – Means Algorithms , 2012 .
[8] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[9] Fabrizio Baiardi,et al. CIDS: A Framework for Intrusion Detection in Cloud Systems , 2012, 2012 Ninth International Conference on Information Technology - New Generations.
[10] Roberto Di Pietro,et al. Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..
[11] Dunja Mladenic,et al. Feature Selection for Dimensionality Reduction , 2005, SLSFS.
[12] Gulshan Kumar,et al. Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN , 2018, Int. J. Inf. Secur. Priv..
[13] Sijia Liu,et al. DifFUZZY: a fuzzy clustering algorithm for complex datasets , 2010, CI 2010.
[14] Zahia Guessoum,et al. False Alarm Reduction Using Adaptive Agent-Based Profiling , 2013, Int. J. Inf. Secur. Priv..
[15] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[16] Marzena Kryszkiewicz,et al. Faster Clustering with DBSCAN , 2005, Intelligent Information Systems.
[17] Mohammad Shoyaib,et al. Feature Selection and Discretization based on Mutual Information , 2017, 2017 IEEE International Conference on Imaging, Vision & Pattern Recognition (icIVPR).
[18] Fuhui Long,et al. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Stephan Dreiseitl,et al. Feature Selection Based on Pairwise Classification Performance , 2009, EUROCAST.
[20] Archana Singh,et al. Network intrusion detection system using various data mining techniques , 2016, 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS).
[21] M. Hemalatha,et al. An evaluation of clustering technique over intrusion detection system , 2012, ICACCI '12.
[22] Ken Barker,et al. Data preprocessing for distance-based unsupervised Intrusion Detection , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[23] Partha Ghosh,et al. An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment , 2014 .
[24] Bhavani M. Thuraisingham,et al. Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..
[25] Yanjie Zhao. Network intrusion detection system model based on data mining , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[26] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[27] Swarnpreet Singh,et al. Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues , 2012 .