An Optimal Intrusion Detection System using GWO-CSA-DSAE Model
暂无分享,去创建一个
[1] Khan Muhammad,et al. Five-category classification of pathological brain images based on deep stacked sparse autoencoder , 2017, Multimedia Tools and Applications.
[2] Nimmy Krishnan,et al. Machine Learning Based Intrusion Detection for Virtualized Infrastructures , 2018, 2018 International CET Conference on Control, Communication, and Computing (IC4).
[3] Chung-Horng Lung,et al. Evaluation of machine learning techniques for network intrusion detection , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
[4] Mohamed Rida,et al. A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection , 2018, Comput. Secur..
[5] Miad Faezipour,et al. Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.
[6] Abdelouahid Derhab,et al. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues , 2020, Knowl. Based Syst..
[7] Verónica Bolón-Canedo,et al. An ensemble of filters and classifiers for microarray data classification , 2012, Pattern Recognit..
[8] Mohamed Farouk,et al. A framework for efficient network anomaly intrusion detection with features selection , 2018, 2018 9th International Conference on Information and Communication Systems (ICICS).
[9] Hong Zhang,et al. Facial expression recognition via learning deep sparse autoencoders , 2018, Neurocomputing.
[10] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[11] Nima Jafari Navimipour,et al. Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm , 2019, ICT Express.
[12] Partha Ghosh,et al. CS-PSO based Intrusion Detection System in Cloud Environment , 2018, Advances in Intelligent Systems and Computing.
[13] Sohail Asghar,et al. Vector Based Genetic Algorithm to optimize predictive analysis in network security , 2017, Applied Intelligence.
[14] Ole-Christoffer Granmo,et al. Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation , 2019, EURASIP Journal on Information Security.
[15] Yu-Lin He,et al. Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..
[16] Shahrzad Zargari,et al. Feature selection in UNSW-NB15 and KDDCUP'99 datasets , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).
[17] Farrukh Aslam Khan,et al. TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection , 2019, IEEE Access.
[18] Andrew Lewis,et al. Grey Wolf Optimizer , 2014, Adv. Eng. Softw..
[19] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[20] Alireza Askarzadeh,et al. A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm , 2016 .
[21] Sunil Kumar Khatri,et al. Filter-based Attribute Selection Approach for Intrusion Detection using k-Means Clustering and Sequential Minimal Optimization Techniq , 2019, 2019 Amity International Conference on Artificial Intelligence (AICAI).
[22] Chirag Modi,et al. Designing an efficient security framework for detecting intrusions in virtual network of cloud computing , 2019, Comput. Secur..
[23] Mohamed Touahria,et al. Feature selection for intrusion detection using new multi-objective estimation of distribution algorithms , 2019, Applied Intelligence.
[24] S. Sai Satyanarayana Reddy,et al. Intrusion Detection in Wireless Network Using Fuzzy Logic Implemented with Genetic Algorithm , 2019 .
[25] Rahul Johari,et al. SOAiCE: Simulation of Attacks in Cloud Computing Environment , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
[26] Arafat Awajan,et al. Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System , 2017, 2017 International Conference on New Trends in Computing Sciences (ICTCS).
[27] Jiadong Ren,et al. A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection , 2019, IEEE Access.
[28] Naveen K. Chilamkurti,et al. Survey on SDN based network intrusion detection system using machine learning approaches , 2018, Peer-to-Peer Networking and Applications.
[29] Deepak Sharma,et al. HyINT: Signature-Anomaly Intrusion Detection System , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[30] Gozde Karatas,et al. Deep Learning in Intrusion Detection Systems , 2018, 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).
[31] Harpreet Singh,et al. A New Hybrid Algorithm Based on Grey Wolf Optimization and Crow Search Algorithm for Unconstrained Function Optimization and Feature Selection , 2019, IEEE Access.
[32] Amin Karami,et al. An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities , 2018, Expert Syst. Appl..
[33] Verónica Bolón-Canedo,et al. Testing Different Ensemble Configurations for Feature Selection , 2017, Neural Processing Letters.
[34] Jaime Lloret,et al. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT , 2017, Sensors.
[35] Ashraf B. El-Sisi,et al. Network Intrusion Detection System based PSO-SVM for Cloud Computing , 2019, International Journal of Computer Network and Information Security.
[36] Mohammed Anbar,et al. Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm , 2019, Journal of Ambient Intelligence and Humanized Computing.
[37] Abdallah Ghourabi,et al. A Hybrid Intrusion Detection System for Cloud Computing Environments , 2019, 2019 International Conference on Computer and Information Sciences (ICCIS).
[38] Na Wang,et al. Building a Cloud IDS Using an Efficient Feature Selection Method and SVM , 2019, IEEE Access.
[39] Sateesh K. Peddoju,et al. HIDS: A host based intrusion detection system for cloud computing environment , 2014, International Journal of System Assurance Engineering and Management.
[40] Abdelmgeid A. Ali,et al. Improving the Performance of the Snort Intrusion Detection Using Clonal Selection , 2019, 2019 International Conference on Innovative Trends in Computer Engineering (ITCE).
[41] Chen Xu,et al. Network Intrusion Detection System as a Service on OpenStack Cloud , 2019, 2019 IEEE 27th International Conference on Network Protocols (ICNP).
[42] Farrukh Aslam Khan,et al. A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection , 2018, Cluster Computing.
[43] Shalini Batra,et al. Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection , 2017, Comput. Electr. Eng..