Machine Learning Techniques for Intrusion Detection
暂无分享,去创建一个
[1] Tameem Ahmad,et al. Attribute-Based Access Control in Web Applications , 2019 .
[2] Tirtharaj Dash,et al. A study on intrusion detection using neural networks trained with evolutionary algorithms , 2017, Soft Comput..
[3] Amanjot Kaur,et al. A Hybrid Approach based on Classification and Clustering for Intrusion Detection System , 2016 .
[4] Nur Izura Udzir,et al. Anomaly-based intrusion detection through K-means clustering and naives bayes classification , 2013 .
[5] Kien A. Hua,et al. Decision tree classifier for network intrusion detection with GA-based feature selection , 2005, ACM Southeast Regional Conference.
[6] Tameem Ahmad,et al. A knowledge based Indian agriculture: With cloud ERP arrangement , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[7] B. B. Gupta,et al. A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques , 2011, 2011 European Intelligence and Security Informatics Conference.
[8] M.I. Heywood,et al. Host-based intrusion detection using self-organizing maps , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[9] Solane Duque,et al. Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS) , 2015, Complex Adaptive Systems.
[10] Robert K. Cunningham,et al. Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.
[11] Brij Bhooshan Gupta,et al. Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud , 2017, Int. J. Cloud Appl. Comput..
[12] Somya,et al. Methods and Techniques of Intrusion Detection: A Review , 2016 .
[13] I. Sumaiya Thaseen,et al. Intrusion detection model using fusion of PCA and optimized SVM , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[14] Salah El Hadaj,et al. Performance evaluation of intrusion detection based on machine learning using Apache Spark , 2018 .
[15] Khattab M. Ali Alheeti,et al. An intrusion detection system against malicious attacks on the communication network of driverless cars , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[16] Rashid Ali,et al. An ISM approach for analyzing the enablers in India's makerspace platforms , 2017, 2017 Learning and Technology Conference (L&T) - The MakerSpace: from Imagining to Making!.
[17] Fabio A. González,et al. An Intelligent Decision Support System for Intrusion Detection and Response , 2001, MMM-ACNS.
[18] Thomas H. Morris,et al. Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems , 2015, IEEE Transactions on Smart Grid.
[19] Tauseef Ahmad,et al. An Energy-Efficient Cluster Head Selection Using Artificial Bees Colony Optimization for Wireless Sensor Networks , 2018, Advances in Nature-Inspired Computing and Applications.
[20] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[21] Alex Alves Freitas,et al. Attribute Selection with a Multi-objective Genetic Algorithm , 2002, SBIA.
[22] Tahir Mehmood,et al. Machine learning algorithms in context of intrusion detection , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).