Machine Learning Techniques for Intrusion Detection

[1]  Tameem Ahmad,et al.  Attribute-Based Access Control in Web Applications , 2019 .

[2]  Tirtharaj Dash,et al.  A study on intrusion detection using neural networks trained with evolutionary algorithms , 2017, Soft Comput..

[3]  Amanjot Kaur,et al.  A Hybrid Approach based on Classification and Clustering for Intrusion Detection System , 2016 .

[4]  Nur Izura Udzir,et al.  Anomaly-based intrusion detection through K-means clustering and naives bayes classification , 2013 .

[5]  Kien A. Hua,et al.  Decision tree classifier for network intrusion detection with GA-based feature selection , 2005, ACM Southeast Regional Conference.

[6]  Tameem Ahmad,et al.  A knowledge based Indian agriculture: With cloud ERP arrangement , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[7]  B. B. Gupta,et al.  A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques , 2011, 2011 European Intelligence and Security Informatics Conference.

[8]  M.I. Heywood,et al.  Host-based intrusion detection using self-organizing maps , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[9]  Solane Duque,et al.  Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS) , 2015, Complex Adaptive Systems.

[10]  Robert K. Cunningham,et al.  Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.

[11]  Brij Bhooshan Gupta,et al.  Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud , 2017, Int. J. Cloud Appl. Comput..

[12]  Somya,et al.  Methods and Techniques of Intrusion Detection: A Review , 2016 .

[13]  I. Sumaiya Thaseen,et al.  Intrusion detection model using fusion of PCA and optimized SVM , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[14]  Salah El Hadaj,et al.  Performance evaluation of intrusion detection based on machine learning using Apache Spark , 2018 .

[15]  Khattab M. Ali Alheeti,et al.  An intrusion detection system against malicious attacks on the communication network of driverless cars , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[16]  Rashid Ali,et al.  An ISM approach for analyzing the enablers in India's makerspace platforms , 2017, 2017 Learning and Technology Conference (L&T) - The MakerSpace: from Imagining to Making!.

[17]  Fabio A. González,et al.  An Intelligent Decision Support System for Intrusion Detection and Response , 2001, MMM-ACNS.

[18]  Thomas H. Morris,et al.  Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems , 2015, IEEE Transactions on Smart Grid.

[19]  Tauseef Ahmad,et al.  An Energy-Efficient Cluster Head Selection Using Artificial Bees Colony Optimization for Wireless Sensor Networks , 2018, Advances in Nature-Inspired Computing and Applications.

[20]  Wei Li,et al.  Using Genetic Algorithm for Network Intrusion Detection , 2004 .

[21]  Alex Alves Freitas,et al.  Attribute Selection with a Multi-objective Genetic Algorithm , 2002, SBIA.

[22]  Tahir Mehmood,et al.  Machine learning algorithms in context of intrusion detection , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).