A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection
暂无分享,去创建一个
[1] I. Linkov,et al. An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks , 2023, IEEE Transactions on Intelligent Transportation Systems.
[2] M. Portmann,et al. Towards a Standard Feature Set for Network Intrusion Detection System Datasets , 2021, Mobile Networks and Applications.
[3] Anjum Nazir,et al. Network Intrusion Detection: Taxonomy and Machine Learning Applications , 2020, Studies in Computational Intelligence.
[4] Prabhat Kumar,et al. TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning , 2020, J. Syst. Archit..
[5] In Lee. Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management , 2020, Future Internet.
[6] Nour Moustafa,et al. A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions , 2020, Electronics.
[7] Yanxia Sun,et al. A deep learning method with wrapper based feature extraction for wireless intrusion detection system , 2020, Comput. Secur..
[8] S. Manimurugan,et al. Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network , 2020, IEEE Access.
[9] Zaffar Haider Janjua,et al. Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices , 2020, IEEE Internet of Things Journal.
[10] Sushmita Ruj,et al. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT , 2020, J. Netw. Comput. Appl..
[11] Pete Burnap,et al. A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.
[12] Kim-Kwang Raymond Choo,et al. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.
[13] Lav Gupta,et al. Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things , 2019, IEEE Internet of Things Journal.
[14] Saïda Bouakaz,et al. A novel database of Children's Spontaneous Facial Expressions (LIRIS-CSE) , 2018, Image Vis. Comput..
[15] Jong Hyuk Park,et al. Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..
[16] Hubert Konik,et al. Saliency-based framework for facial expression recognition , 2018, Frontiers of Computer Science.
[17] Rahmi Khoirani. Common Vulnerability and Exposures (CVE) , 2018 .
[18] Md. Zakirul Alam Bhuiyan,et al. Security and Attack Vector Analysis of IoT Devices , 2017, SpaCCS Workshops.
[19] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[20] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[21] William Stafford Noble,et al. Machine learning applications in genetics and genomics , 2015, Nature Reviews Genetics.
[22] Manel Guerrero Zapata,et al. A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks , 2015, Neurocomputing.
[23] Dimitrios I. Fotiadis,et al. Machine learning applications in cancer prognosis and prediction , 2014, Computational and structural biotechnology journal.
[24] Panos Louvieris,et al. Effects-based feature identification for network intrusion detection , 2013, Neurocomputing.
[25] H. Konik,et al. Framework for reliable, real-time facial expression recognition for low resolution images , 2013, Pattern Recognit. Lett..
[26] Wei Cong,et al. Anomaly intrusion detection based on PLS feature extraction and core vector machine , 2013, Knowl. Based Syst..
[27] H. Konik,et al. Human vision inspired framework for facial expressions recognition , 2012, 2012 19th IEEE International Conference on Image Processing.
[28] Steven Thomason,et al. Improving Network Security: Next Generation Firewalls and Advanced Packet Inspection Devices , 2012 .
[29] Jennifer G. Dy,et al. From Transformation-Based Dimensionality Reduction to Feature Selection , 2010, ICML.
[30] Hiroshi Motoda,et al. Computational Methods of Feature Selection , 2022 .
[31] Deng Cai,et al. Laplacian Score for Feature Selection , 2005, NIPS.
[32] Yann LeCun,et al. Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[33] John W. Lockwood,et al. Deep packet inspection using parallel Bloom filters , 2003, 11th Symposium on High Performance Interconnects, 2003. Proceedings..
[34] Huan Liu,et al. Feature selection for clustering - a filter solution , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[35] Daphne Koller,et al. Support Vector Machine Active Learning with Applications to Text Classification , 2000, J. Mach. Learn. Res..
[36] Gilbert Held,et al. The TCP/IP Protocol Suite , 2001 .
[37] R. Romero,et al. Tabu search algorithm for network synthesis , 2000 .
[38] Govind P. Gupta,et al. Hybrid Meta-Heuristic based Feature Selection Mechanism for Cyber-Attack Detection in IoT-enabled Networks , 2023, Procedia Computer Science.
[39] Anjum Nazir,et al. A novel combinatorial optimization based feature selection method for network intrusion detection , 2021, Comput. Secur..
[40] Ahmed A. Nashat,et al. Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset , 2021, IEEE Access.
[41] Theyazn H. H. Aldhyani,et al. Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms , 2021, Complex..
[42] Q. Mahmoud,et al. Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks , 2021, IEEE Access.
[43] Anongnart Srivihok,et al. Wrapper Feature Subset Selection for Dimension Reduction Based on Ensemble Learning Algorithm , 2015 .
[44] C. Patley,et al. Alloxan Induced Oxidative Stress and Impairment of Oxidative Defense System in rats , 2013 .
[45] Carter Bays,et al. Introduction to Cellular Automata and Conway's Game of Life , 2010, Game of Life Cellular Automata.
[46] Lawrence O. Hall,et al. A Comparison of Decision Tree Ensemble Creation Techniques , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[47] Jason Weston,et al. Embedded Methods , 2006, Feature Extraction.
[48] John W. Lockwood,et al. Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.
[49] Yoshua Bengio,et al. Pattern Recognition and Neural Networks , 1995 .