Hybrid intrusion detection system using machine learning
暂无分享,去创建一个
[1] Ejaz Ahmed,et al. Real-time big data processing for anomaly detection: A Survey , 2019, Int. J. Inf. Manag..
[2] Sallam Osman Fageeri,et al. An Efficient Log File Analysis Algorithm Using Binary-based Data Structure , 2014 .
[3] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[4] M. Vijayalakshmi,et al. Secured Temporal Log Management Techniques for Cloud , 2015 .
[5] Esmiralda Moradian,et al. Secure Audit Log Management , 2013, KES.
[6] Pin Lv,et al. Mining Host Behavior Patterns From Massive Network and Security Logs , 2017, ICCS.
[7] Sung Wook Baik,et al. Machine learning-assisted signature and heuristic-based detection of malwares in Android devices , 2017, Comput. Electr. Eng..
[8] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[9] Amar Meryem,et al. A novel approach in detecting intrusions using NSLKDD database and MapReduce programming , 2017 .
[10] Ran Liu,et al. Investigation of machine learning based network traffic classification , 2017, 2017 International Symposium on Wireless Communication Systems (ISWCS).
[11] Jie Yang,et al. HIDS-DT: An Effective Hybrid Intrusion Detection System Based on Decision Tree , 2010, 2010 International Conference on Communications and Mobile Computing.
[12] Balachandra Muniyal,et al. Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection , 2016 .
[13] Supeno Djanali,et al. Assessing Centroid-Based Classification Models for Intrusion Detection System Using Composite Indicators , 2019, Procedia Computer Science.
[14] Mouad Lemoudden,et al. A Binary-based MapReduce Analysis for Cloud Logs , 2016, ANT/SEIT.
[15] Subutai Ahmad,et al. Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.
[16] Nazli Goharian,et al. Misuse detection for information retrieval systems , 2003, CIKM '03.
[17] Indraneel Sreeram,et al. HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm , 2019, Applied Computing and Informatics.
[18] Idris Bharanidharan Shanmugam,et al. Hybrid intelligent Intrusion Detection System , 2005 .
[19] Saeid Nahavandi,et al. Extreme learning machine based transfer learning algorithms: A survey , 2017, Neurocomputing.
[20] Mohsin Iftikhar,et al. A Comprehensive Survey on Security in Cloud Computing , 2017, FNC/MobiSPC.
[21] Mouad Lemoudden,et al. Managing cloud-generated logs using big data technologies , 2015, 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[22] José Antonio Lozano,et al. An efficient approximation to the K-means clustering for massive data , 2017, Knowl. Based Syst..
[23] Akash Garg,et al. A hybrid intrusion detection system: A review , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).
[24] Yuval Elovici,et al. Quantifying the resilience of machine learning classifiers used for cyber security , 2018, Expert Syst. Appl..
[25] Amar Meryem,et al. Enhancing Cloud Security using advanced MapReduce k-means on log files , 2018, ICSIM2018.
[26] Tingting Li,et al. Fuzzy c-means clustering based on weights and gene expression programming , 2017, Pattern Recognit. Lett..