A Survey on Intrusion Detection System Using Artificial Intelligence
暂无分享,去创建一个
[1] Hiren Kumar Deva Sarma,et al. A probability based stable routing for cognitive radio adhoc networks , 2015, Wireless Networks.
[2] Julian Jang,et al. A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..
[3] K. Navi,et al. Optimum Quaternary Galois Field Circuit Design through Carbon Nano Tube Technology , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).
[4] Gulshan Kumar,et al. The use of artificial intelligence based techniques for intrusion detection: a review , 2010, Artificial Intelligence Review.
[5] M. A. Jabbar,et al. Random Forest Modeling for Network Intrusion Detection System , 2016 .
[6] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[7] S. Smys,et al. Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks , 2018, Wirel. Pers. Commun..
[8] Jun Peng,et al. Intrusion Detection System Enhanced by Hierarchical Bidirectional Fuzzy Rule Interpolation , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[9] Iti Saha Misra,et al. Multilayer Hierarchical Model for Mobility Management in IPv6: A Mathematical Exploration , 2014, Wirel. Pers. Commun..
[10] Jasmin Kevric,et al. An effective combining classifier approach using tree algorithms for network intrusion detection , 2017, Neural Computing and Applications.
[11] Jong Hyuk Park,et al. Social network security: Issues, challenges, threats, and solutions , 2017, Inf. Sci..
[12] Shahram Babaie,et al. A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection , 2018, Comput. Networks.
[13] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[14] Seyed Mojtaba Hosseini Bamakan,et al. An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016, Neurocomputing.
[15] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[16] Manuel López Martín,et al. Adversarial environment reinforcement learning algorithm for intrusion detection , 2019, Comput. Networks.
[17] Aladdin Ayesh,et al. Intelligent intrusion detection systems using artificial neural networks , 2018, ICT Express.
[18] Dinesh Kumar A,et al. Fault Detection Methodology in Wireless Sensor Network , 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on.
[19] A. Praveena,et al. Prevention of inference attacks for private information in social networking sites , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).
[20] L. Coventry,et al. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. , 2018, Maturitas.
[21] S. Smys,et al. Intelligent security framework for iot devices cryptography based end-to-end security architecture , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).
[22] Andreas Hotho,et al. A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..
[23] Michail Maniatakos,et al. Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.
[24] I. S. Misra,et al. Mathematical Modeling of Hierarchical Mobile IPv6 Based Network Architecture in Search of Optimal Performance , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).
[25] Robert Bestak,et al. Special issue on evolutionary computing and intelligent sustainable systems , 2019, Soft Comput..
[26] Hiren Kumar Deva Sarma,et al. Cluster based routing in cognitive radio adhoc networks: Reconnoitering SINR and ETT impact on clustering , 2018, Comput. Commun..