Intrusion Detection using Machine Learning Techniques: An Experimental Comparison
暂无分享,去创建一个
Wadii Boulila | Jan Sher Khan | Jawad Ahmad | Fadia Ali Khan | Fehaid Alqahtani | Mujeeb Ur Rehman | Awais Aziz Shah | Kathryn-Ann Tait | M. Rehman | Fehaid Alqahtani | Jawad Ahmad | W. Boulila | J. Khan | A. Shah | Kathryn-Ann Tait
[1] Wadii Boulila,et al. A Novel CNN-LSTM-based Approach to Predict Urban Expansion , 2021, Ecol. Informatics.
[2] Zhuo Zou,et al. A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network , 2020, IEEE Access.
[3] Wadii Boulila,et al. Voting Classifier-based Intrusion Detection for IoT Networks , 2021, Advances on Smart and Soft Computing.
[4] Marc Frappier,et al. Intrusion Detection Systems: A Cross-Domain Overview , 2019, IEEE Communications Surveys & Tutorials.
[5] Mark A. Hall,et al. Correlation-based Feature Selection for Machine Learning , 2003 .
[6] Wadii Boulila,et al. Detecting the Security Level of Various Cryptosystems Using Machine Learning Models , 2021, IEEE Access.
[7] Kelly O. Finnerty,et al. Cyber Security Breaches Survey 2020 , 2019 .
[8] N. Japkowicz. Why Question Machine Learning Evaluation Methods ? ( An illustrative review of the shortcomings of current methods ) , 2006 .
[9] Arshad,et al. Intrusion Detection and Attack Classification Leveraging Machine Learning Technique , 2020, 2020 14th International Conference on Innovations in Information Technology (IIT).
[10] Peter Christen,et al. A note on using the F-measure for evaluating record linkage algorithms , 2017, Statistics and Computing.
[11] M. Rege,et al. Machine Learning for Cyber Defense and Attack , 2018 .
[12] Pekka Matilainen,et al. Evaluation of the confusion matrix method in the validation of an automated system for measuring feeding behaviour of cattle , 2018, Behavioural Processes.
[13] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.
[14] A. N. Zincir-Heywood,et al. Intrusion Detection Systems , 2008 .
[15] Arshad,et al. Network Intrusion Detection Leveraging Machine Learning and Feature Selection , 2020, 2020 IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET).
[16] Hafiz Adnan Niaz,et al. Accelerated GPU Based Protein Sequence Alignment – An optimized database sequences approach , 2017 .
[17] Imed Romdhani,et al. Big data and IoT-based applications in smart environments: A systematic review , 2021, Comput. Sci. Rev..
[18] Fuad A. Ghaleb,et al. RS-DCNN: A novel distributed convolutional-neural-networks based-approach for big remote-sensing image classification , 2021, Comput. Electron. Agric..
[19] Aladdin Ayesh,et al. Intelligent intrusion detection systems using artificial neural networks , 2018, ICT Express.
[20] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[21] Jawad Ahmad,et al. A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things , 2021, IEEE Access.