Enhanced intrusion detection system via agent clustering and classification based on outlier detection
暂无分享,去创建一个
[1] I. A. Hodashinsky,et al. Algorithm for tuning fuzzy network attack classifiers based on invasive weed optimization , 2014, 2014 Dynamics of Systems, Mechanisms and Machines (Dynamics).
[2] Yong Shi,et al. Malicious Domain Name Detection Based on Extreme Machine Learning , 2017, Neural Processing Letters.
[3] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[4] Dharmender Kumar,et al. A novel hybrid K-means and artificial bee colony algorithm approach for data clustering , 2018 .
[5] Puja Padiya,et al. Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function , 2015 .
[6] G. Nagarajan,et al. Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach☆ , 2015 .
[7] John R. Williams,et al. Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.
[8] D. G. Narayan,et al. Detection of distributed denial of service attacks using machine learning algorithms in software defined networks , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[9] T Shimna,et al. Continuous Outlier Detection Based on Sliding window on Continuous Data Streams , 2016 .
[10] B. Muthukumar,et al. Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach , 2015 .
[11] Ganesh Kumar,et al. Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.
[12] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[13] R. Hamsa Veni,et al. Identifying Malicious Web Links and Their Attack Types in Social Networks , 2018 .
[14] Abas Md Said,et al. Hybrid machine learning technique for intrusion detection system , 2015 .
[15] Kayhan Zrar Ghafoor,et al. An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs , 2018, IEEE Access.
[16] nbspAastha Puri,et al. A NOVEL TECHNIQUE FOR INTRUSION DETECTION SYSTEM FOR NETWORK SECURITY USING HYBRID SVM-CART , 2017 .
[17] Md. Nasir Sulaiman,et al. K-Means Clustering and Naive Bayes Classification for Intrusion Detection , 2016 .
[18] Ali Feizollah,et al. Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.
[19] Junping Du,et al. Anomaly Detection Using Local Kernel Density Estimation and Context-Based Regression , 2020, IEEE Transactions on Knowledge and Data Engineering.
[20] Mia Hubert,et al. Anomaly detection by robust statistics , 2017, WIREs Data Mining Knowl. Discov..
[21] V VasilakosAthanasios,et al. Security in cloud computing , 2015 .
[22] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..