[1]
|
Veri Ölçekleme ve Eksik Veri Tamamlama Yöntemlerinin Makine Öğrenmesi Yöntemlerinin Başarısına Etkisinin İncelenmesi
Düzce Üniversitesi Bilim ve Teknoloji Dergisi,
2023
DOI:10.29130/dubited.948564
|
|
|
[2]
|
Differentially expressed discriminative genes and significant meta-hub genes based key genes identification for hepatocellular carcinoma using statistical machine learning
Scientific Reports,
2023
DOI:10.1038/s41598-023-30851-1
|
|
|
[3]
|
Optimal Channels and Features Selection Based ADHD Detection From EEG Signal Using Statistical and Machine Learning Techniques
IEEE Access,
2023
DOI:10.1109/ACCESS.2023.3264266
|
|
|
[4]
|
Network intrusion detection based on conditional wasserstein variational autoencoder with generative adversarial network and one-dimensional convolutional neural networks
Applied Intelligence,
2023
DOI:10.1007/s10489-022-03995-2
|
|
|
[5]
|
Veri Ölçekleme ve Eksik Veri Tamamlama Yöntemlerinin Makine Öğrenmesi Yöntemlerinin Başarısına Etkisinin İncelenmesi
Düzce Üniversitesi Bilim ve Teknoloji Dergisi,
2023
DOI:10.29130/dubited.948564
|
|
|
[6]
|
An Advanced Intrusion Detection Algorithm for Network Traffic Using Convolution Neural Network
2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT),
2023
DOI:10.1109/ICECCT56650.2023.10179767
|
|
|
[7]
|
Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks
IEEE Transactions on Network Science and Engineering,
2023
DOI:10.1109/TNSE.2022.3184975
|
|
|
[8]
|
A Hybrid Model for Predicting Classification Dataset based on Random Forest, Support Vector Machine and Artificial Neural Network
International Journal of Innovative Technology and Exploring Engineering,
2023
DOI:10.35940/ijitee.A9757.1213123
|
|
|
[9]
|
Gene Expression and Metadata Based Identification of Key Genes for Hepatocellular Carcinoma Using Machine Learning and Statistical Models
IEEE/ACM Transactions on Computational Biology and Bioinformatics,
2023
DOI:10.1109/TCBB.2023.3322753
|
|
|
[10]
|
An Abnormal Traffic Detection Model Combined BiIndRNN With Global Attention
IEEE Access,
2022
DOI:10.1109/ACCESS.2022.3159550
|
|
|
[11]
|
Detection of Traffic on the Network based on a Real Dataset for the IIM method and ML-TSDS Algorithm
2022 International Conference on Automation, Computing and Renewable Systems (ICACRS),
2022
DOI:10.1109/ICACRS55517.2022.10029324
|
|
|
[12]
|
Balanced Twin Auto-Encoder for IoT Intrusion Detection
GLOBECOM 2022 - 2022 IEEE Global Communications Conference,
2022
DOI:10.1109/GLOBECOM48099.2022.10000891
|
|
|
[13]
|
Analyzing sensitivity of flood susceptible model in a flood plain river basin
Geocarto International,
2022
DOI:10.1080/10106049.2021.1967464
|
|
|
[14]
|
Efficient Feature Selection and Machine Learning Based ADHD Detection Using EEG Signal
Computers, Materials & Continua,
2022
DOI:10.32604/cmc.2022.028339
|
|
|
[15]
|
Detection of Traffic on the Network based on a Real Dataset for the IIM method and ML-TSDS Algorithm
2022 International Conference on Automation, Computing and Renewable Systems (ICACRS),
2022
DOI:10.1109/ICACRS55517.2022.10029324
|
|
|
[16]
|
Intelligent One-Class Classifiers for the Development of an Intrusion Detection System: The MQTT Case Study
Electronics,
2022
DOI:10.3390/electronics11030422
|
|
|
[17]
|
Network intrusion detection based on conditional wasserstein variational autoencoder with generative adversarial network and one-dimensional convolutional neural networks
Applied Intelligence,
2022
DOI:10.1007/s10489-022-03995-2
|
|
|
[18]
|
An Explainable Deep Neural Framework for Trustworthy Network Intrusion Detection
2022 10th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud),
2022
DOI:10.1109/MobileCloud55333.2022.00011
|
|
|
[19]
|
Online Kanji Characters Based Writer Identification Using Sequential Forward Floating Selection and Support Vector Machine
Applied Sciences,
2022
DOI:10.3390/app122010249
|
|
|
[20]
|
Shaping future low-carbon energy and transportation systems: Digital technologies and applications
iEnergy,
2022
DOI:10.23919/IEN.2022.0040
|
|
|
[21]
|
Identification of key candidate genes for IgA nephropathy using machine learning and statistics based bioinformatics models
Scientific Reports,
2022
DOI:10.1038/s41598-022-18273-x
|
|
|
[22]
|
Balanced Twin Auto-Encoder for IoT Intrusion Detection
GLOBECOM 2022 - 2022 IEEE Global Communications Conference,
2022
DOI:10.1109/GLOBECOM48099.2022.10000891
|
|
|
[23]
|
Proceedings of International Conference on Emerging Technologies and Intelligent Systems
Lecture Notes in Networks and Systems,
2022
DOI:10.1007/978-3-030-85990-9_24
|
|
|
[24]
|
Sustainable Smart Cities and Territories
Lecture Notes in Networks and Systems,
2022
DOI:10.1007/978-3-030-78901-5_22
|
|
|
[25]
|
Contextual anomaly detection on time series: a case study of metro ridership analysis
Neural Computing and Applications,
2022
DOI:10.1007/s00521-021-06455-z
|
|
|
[26]
|
An Abnormal Traffic Detection Model Combined BiIndRNN With Global Attention
IEEE Access,
2022
DOI:10.1109/ACCESS.2022.3159550
|
|
|
[27]
|
Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks
Wireless Personal Communications,
2022
DOI:10.1007/s11277-021-09280-8
|
|
|
[28]
|
Important Features Selection and Classification of Adult and Child from Handwriting Using Machine Learning Methods
Applied Sciences,
2022
DOI:10.3390/app12105256
|
|
|
[29]
|
Network traffic verification based on a public dataset for IDS systems and machine learning classification algorithms
2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO),
2022
DOI:10.23919/MIPRO55190.2022.9803674
|
|
|
[30]
|
Intrusion Detection System Using K-Means and Edited Nearest Neighbour Algorithm
International Journal of Advanced Research in Science, Communication and Technology,
2022
DOI:10.48175/IJARSCT-5052
|
|
|
[31]
|
Assessing the Yield of Wheat Using Satellite Remote Sensing-Based Machine Learning Algorithms and Simulation Modeling
Remote Sensing,
2022
DOI:10.3390/rs14133005
|
|
|
[32]
|
A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms
Annals of Telecommunications,
2022
DOI:10.1007/s12243-021-00904-5
|
|
|
[33]
|
Depression Anxiety Stress Scale and Handgrip using Machine Learning Analysis
2022 4th International Conference on Smart Sensors and Application (ICSSA),
2022
DOI:10.1109/ICSSA54161.2022.9870948
|
|
|
[34]
|
RADE: resource-efficient supervised anomaly detection using decision tree-based ensemble methods
Machine Learning,
2021
DOI:10.1007/s10994-021-06047-x
|
|
|
[35]
|
Network Security: Threat Model, Attacks, and IDS Using Machine Learning
2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS),
2021
DOI:10.1109/ICAIS50930.2021.9395884
|
|
|
[36]
|
A Powerful Ensemble Learning Approach for Improving Network Intrusion Detection System (NIDS)
2021 Fifth International Conference On Intelligent Computing in Data Sciences (ICDS),
2021
DOI:10.1109/ICDS53782.2021.9626727
|
|
|
[37]
|
A Tree Based Machine Learning and Deep Learning Classification for Network Intrusion Detection
European Journal of Science and Technology,
2021
DOI:10.31590/ejosat.889994
|
|
|
[38]
|
Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning
IEEE Access,
2021
DOI:10.1109/ACCESS.2020.3048198
|
|
|
[39]
|
Recent Advances in the Prediction of Protein Structural Classes: Feature Descriptors and Machine Learning Algorithms
Crystals,
2021
DOI:10.3390/cryst11040324
|
|
|
[40]
|
Resource Efficient Boosting Method for IoT Security Monitoring
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC),
2021
DOI:10.1109/CCNC49032.2021.9369620
|
|
|
[41]
|
Computer Networks, Big Data and IoT
Lecture Notes on Data Engineering and Communications Technologies,
2021
DOI:10.1007/978-981-16-0965-7_67
|
|
|
[42]
|
Machine Learning for Threat Recognition in Critical Cyber-Physical Systems
2021 IEEE International Conference on Cyber Security and Resilience (CSR),
2021
DOI:10.1109/CSR51186.2021.9527979
|
|
|
[43]
|
Comparing Methods of Feature Extraction of Brain Activities for Octave Illusion Classification Using Machine Learning
Sensors,
2021
DOI:10.3390/s21196407
|
|
|
[44]
|
Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection
2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI),
2021
DOI:10.1109/CCCI52664.2021.9583206
|
|
|
[45]
|
IoT Dataset Validation Using Machine Learning Techniques for Traffic Anomaly Detection
Electronics,
2021
DOI:10.3390/electronics10222857
|
|
|
[46]
|
ACGANs-CNN: A Novel Intrusion Detection Method
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/1757/1/012012
|
|
|
[47]
|
Second International Conference on Computer Networks and Communication Technologies
Lecture Notes on Data Engineering and Communications Technologies,
2020
DOI:10.1007/978-3-030-37051-0_95
|
|
|
[48]
|
Second International Conference on Computer Networks and Communication Technologies
Lecture Notes on Data Engineering and Communications Technologies,
2020
DOI:10.1007/978-3-030-37051-0_95
|
|
|
[49]
|
Learning dispatching rules for single machine scheduling with dynamic arrivals based on decision trees and feature construction
International Journal of Production Research,
2020
DOI:10.1080/00207543.2020.1741716
|
|
|
[50]
|
IGAN-IDS: An Imbalanced Generative Adversarial Network towards Intrusion Detection System in Ad-hoc Networks
Ad Hoc Networks,
2020
DOI:10.1016/j.adhoc.2020.102177
|
|
|
[51]
|
A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms
Symmetry,
2020
DOI:10.3390/sym12061046
|
|
|
[52]
|
Computational method to prove efficacy of datasets
Journal of Information and Optimization Sciences,
2020
DOI:10.1080/02522667.2020.1747193
|
|
|
[53]
|
An Enhanced Way of Distributed Denial of Service Attack Detection by Applying Machine Learning Algorithms in Cloud Computing
Journal of Computational and Theoretical Nanoscience,
2020
DOI:10.1166/jctn.2020.9317
|
|
|
[54]
|
Assessment of Machine Learning Techniques for Building an Efficient IDS
2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH),
2020
DOI:10.1109/SMART-TECH49988.2020.00048
|
|
|
[55]
|
A Two Layer Machine Learning System for Intrusion Detection Based on Random Forest and Support Vector Machine
2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE),
2020
DOI:10.1109/WIECON-ECE52138.2020.9397945
|
|
|
[56]
|
An Intrusion Detection Model based on a Convolutional Neural
Network
Journal of Multimedia Information System,
2019
DOI:10.33851/JMIS.2019.6.4.165
|
|
|
[57]
|
Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc Networks
Journal of Physics: Conference Series,
2019
DOI:10.1088/1742-6596/1288/1/012075
|
|
|
[58]
|
Special Issue on Using Machine Learning Algorithms in the Prediction of Kyphosis Disease: A Comparative Study
Applied Sciences,
2019
DOI:10.3390/app9163322
|
|
|
[59]
|
A Novel Intrusion Detector Based on Deep Learning Hybrid Methods
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS),
2019
DOI:10.1109/BigDataSecurity-HPSC-IDS.2019.00062
|
|
|
[60]
|
Exploration of Cervical Myelopathy Location From Somatosensory Evoked Potentials Using Random Forests Classification
IEEE Transactions on Neural Systems and Rehabilitation Engineering,
2019
DOI:10.1109/TNSRE.2019.2945634
|
|
|
[61]
|
HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection
IEEE Access,
2018
DOI:10.1109/ACCESS.2017.2780250
|
|
|
[62]
|
Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning
IEEE Access,
2018
DOI:10.1109/ACCESS.2017.2782159
|
|
|
[63]
|
LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network
Security and Communication Networks,
2018
DOI:10.1155/2018/6026878
|
|
|
[64]
|
Classification of Human Daily Activities Using Ensemble Methods Based on Smartphone Inertial Sensors
Sensors,
2018
DOI:10.3390/s18124132
|
|
|
[65]
|
An Abnormal Behavior Detection Based on Deep Learning
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI),
2018
DOI:10.1109/SmartWorld.2018.00045
|
|
|
[66]
|
DoS Attack Detection Using Machine Learning and Neural Network
2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA),
2018
DOI:10.1109/ICCUBEA.2018.8697702
|
|
|
[67]
|
Securing Big Data Ecosystem with NSGA-II and Gradient Boosted Trees Based NIDS Using Spark
2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS),
2018
DOI:10.1109/ICCONS.2018.8663120
|
|
|
[68]
|
NIDS: Neural Network based Intrusion Detection System
2018 IEEE International Symposium on Technologies for Homeland Security (HST),
2018
DOI:10.1109/THS.2018.8574174
|
|
|
[69]
|
Towards a multi‐layers anomaly detection framework for analyzing network traffic
Concurrency and Computation: Practice and Experience,
2017
DOI:10.1002/cpe.3955
|
|
|
[70]
|
Towards a multi-layers anomaly detection framework for analyzing network traffic
Concurrency and Computation: Practice and Experience,
2017
DOI:10.1002/cpe.3955
|
|
|
[71]
|
Protein subcellular localization prediction using multiple kernel learning based support vector machine
Mol. BioSyst.,
2017
DOI:10.1039/C6MB00860G
|
|
|
[72]
|
A Novel Unsupervised Anomaly Detection Approach for Intrusion Detection System
2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS),
2017
DOI:10.1109/BigDataSecurity.2017.56
|
|
|
[73]
|
Study on credit evaluation of electricity users based on random forest
2017 Chinese Automation Congress (CAC),
2017
DOI:10.1109/CAC.2017.8243614
|
|
|
[74]
|
Random Forest Modeling for Network Intrusion Detection System
Procedia Computer Science,
2016
DOI:10.1016/j.procs.2016.06.047
|
|
|
[75]
|
Feature Selection for Intrusion Detection Using Random Forest
Journal of Information Security,
2016
DOI:10.4236/jis.2016.73009
|
|
|
[76]
|
Behaviour-Based Attack Detection and Classification in Cyber Physical Systems Using Machine Learning
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security - CPSS '16,
2016
DOI:10.1145/2899015.2899016
|
|
|
[77]
|
Comparative study for feature selection algorithms in intrusion detection system
Automatic Control and Computer Sciences,
2016
DOI:10.3103/S0146411616010028
|
|
|
[78]
|
Applying Big Data Analytics Into Network Security: Challenges, Techniques and Outlooks
2016 IEEE International Conference on Smart Cloud (SmartCloud),
2016
DOI:10.1109/SmartCloud.2016.62
|
|
|
[79]
|
A Novel Anomaly Detection Approach for Mitigating Web-Based Attacks Against Clouds
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing,
2015
DOI:10.1109/CSCloud.2015.46
|
|
|
[80]
|
MARK-ELM: Application of a novel Multiple Kernel Learning framework for improving the robustness of Network Intrusion Detection
Expert Systems with Applications,
2015
DOI:10.1016/j.eswa.2014.12.040
|
|
|
[81]
|
Hybrid ModifiedK-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems
The Scientific World Journal,
2015
DOI:10.1155/2015/294761
|
|
|
[82]
|
An information hiding system based on high frame rate video
2015 International Conference on Computers, Communications, and Systems (ICCCS),
2015
DOI:10.1109/CCOMS.2015.7562890
|
|
|
[83]
|
An evolutionary fuzzy genetic and Naïve Bayesian approach for multivariate data classification
2014 17th International Conference on Computer and Information Technology (ICCIT),
2014
DOI:10.1109/ICCITechn.2014.7073108
|
|
|