Benchmark Datasets for Network Intrusion Detection: A Review
暂无分享,去创建一个
Ludovic Journaux | Yasir Hamid | V. R. Balasaraswathi | Veeran Ranganathan Balasaraswathi | Muthukumarasamy Sugumaran | L. Journaux | M. Sugumaran | Yasir Hamid
[1] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[2] Dr.R Ravinder Reddy. Network Intrusion Anomaly Detection Using Radial Basis Function Networks , 2017 .
[3] Zhang Yi,et al. A hierarchical intrusion detection model based on the PCA neural networks , 2007, Neurocomputing.
[4] Keke Gai,et al. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016, Secur. Commun. Networks.
[5] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[6] Jugal K. Kalita,et al. An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection , 2015, Pattern Recognit. Lett..
[7] A. A. Orunsolu,et al. An Anti-Phishing Kit Scheme for Secure Web Transactions , 2017, ICISSP.
[8] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[9] Shahaboddin Shamshirband,et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..
[10] Gisung Kim,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..
[11] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[12] Balachandra Muniyal,et al. Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection , 2016 .
[13] Jiankun Hu,et al. Generation of a new IDS test dataset: Time to retire the KDD collection , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[14] Shahram Sarkani,et al. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..
[15] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[16] M. Sugumaran,et al. A Fusion of Feature Extraction and Feature Selection Technique for Network Intrusion Detection , 2016 .
[17] Mahesh Chandra Govil,et al. A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).
[18] Daniel Kudenko,et al. Distributed response to network intrusions using multiagent reinforcement learning , 2015, Eng. Appl. Artif. Intell..
[19] Pei-Chann Chang,et al. A population-based incremental learning approach with artificial immune system for network intrusion detection , 2016, Eng. Appl. Artif. Intell..
[20] Yu-Lin He,et al. Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..
[21] S. Janakiraman,et al. ACO based Distributed Intrusion Detection System , 2009, J. Digit. Content Technol. its Appl..
[22] C. D. Jaidhar,et al. Comparative study of Principal Component Analysis based Intrusion Detection approach using machine learning algorithms , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).
[23] Adel Sabry Eesa,et al. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..