Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Category-Based Intrusion Detection Using PCA"
written by Gholam Reza Zargar, Tania Baghaie,
published by Journal of Information Security, Vol.3 No.4, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] FSAnalysis: a feature selection and analysis mechanism considering balanced and unbalanced bases
2022 17th Iberian …, 2022
[2] A Performance Analysis of Machine Learning Models for Attack Prediction using Different Feature Selection Techniques
2022 IEEE/ACIS 7th International Conference …, 2022
[3] Development of a new system to detect denial of service attack using machine learning classification
Indonesian Journal of …, 2021
[4] Building attack detection system base on machine learning
2021
[5] Anomaly Intrusion Detection Using SVM and C4. 5 Classification With an Improved Particle Swarm Optimization (I-PSO)
2021
[6] A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
2021
[7] AProposed MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION CAPABILITY OF INTRUSION PROTECTION SYSTEMS
International Journal of Network Security & Its Applications, 2020
[8] A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems
International Journal of Network Security & Its …, 2020
[9] An empirical model in intrusion detection systems using principal component analysis and deep learning models
2020
[10] Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection
2019
[11] Detecting Anomalous Network Traffic in IoT Networks
2019
[12] Data Model Classification Based on Machine Learning Techniques for Detection of Anomalous Traffic
Cartagena de Indias, 2019
[13] Data Pre-Processing and Classification for Traffic Anomaly Intrusion Detection Using NSLKDD Dataset
Cybernetics and Information Technologies, 2018
[14] A Proposed Machine Learning based Scheme for Intrusion Detection
2018
[15] Intrusion Detection System Using Data Mining
International Research Journal of Engineering and Technology, 2018
[16] A PCA-based method for IoT network traffic anomaly detection
2018
[17] Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers
Wireless Personal Communications, 2018
[18] Intrusion detection in RFID system using computational intelligence approach for underground mines
International Journal of Communication Systems, 2018
[19] Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic.
2017
[20] Addressing Challenges in Big Data Intrusion Detection System using Machine Learning Techniques
2017
[21] Research on Translation and Rotation in Handwritten Digits Recognition
2017
[22] Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks
2017
[23] Sistema inteligente de apoio à deteção e previsão de cyber ataques em sistemas computacionais
2017
[24] Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic
2017
[25] Improving intrusion detection using a novel normalization method along with the use of harmony search algorithm for feature selection
2015
[26] Study of stochastic and machine learning techniques for anomalybased web attack detection
Thesis, 2015
[27] Network intrusion detection system using J48 Decision Tree
Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on, 2015
[28] Detection and Containment the Attack that Leads to a Denial of Service Attack
Journal of Algorithms, Computer Network, and Security, 2015
[29] Study of stochastic and machine learning tecniques for anomaly-based Web atack detection
2015
[30] Feature Based Unsupervised Intrusion Detection
International Journal of Computer and Information Engineering, 2014
[31] L-002 主成分分析を用いた分類器による SQL インジェクション攻撃の自動検出法 (L 分野: ネットワーク?セキュリティ, 一般論文)
情報科学技術フォーラム講演論文集, 2013
[32] 基于流的大规模网络安全态势感知关键技术研究
2013
[33] L-002 主成分分析を用いた分類器による SQL インジェクション攻撃の自動検出法 (L 分野: ネットワーク・セキュリティ, 一般論文)
2013
[34] Intrusion Detection System Using Data Mining Technique: Support Vector Machine
International Journal of Emerging Technology and Advanced Engineering, 2013
[35] Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
International Organization of Scientific Research Journal of Computer Engineering (IOSR-JCE), 2013
[36] Network backbone anomaly detection using double random forests based on non-extensive entropy feature extraction
Natural Computation (ICNC), 2013 Ninth International Conference on. IEEE, 2013
[37] IDS in Telecommunication Network Using PCA
arXiv preprint arXiv:1308.2779, 2013
[38] 基于改进非广延熵特征提取的双随机森林实时入侵检测方法
计算机科学, 2013
[39] 主成分分析を用いた分類器による SQL インジェクション攻撃の自動検出法
園田道夫, 松田健, 小泉大城, and 趙晋輝, 2013
[40] Improving performance of support vector machine for intrusion detection using discretization
2013
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top