Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets"
written by Bhavesh Borisaniya, Dhiren Patel,
published by Journal of Information Security, Vol.6 No.3, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Self-healing hybrid intrusion detection system: an ensemble machine learning approach
Discover Artificial …, 2024
[2] ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System
arXiv preprint arXiv …, 2024
[3] Combining dynamic and static host intrusion detection features using variational long short-term memory recurrent autoencoder
Вестник Санкт-Петербургского …, 2024
[4] Įsibrovimo aptikimas analizuojant kompiuterio lygmens žurnalinius įrašus iš AWSCTD duomenų rinkinio
2023
[5] A New Federated Learning Model for Host Intrusion Detection System Under Non-IID Data
2023 IEEE International …, 2023
[6] Cybersecurity attacks: which dataset should be used to evaluate an intrusion detection system?
Vojnotehnički glasnik, 2023
[7] API-based features representation fusion for malware classification
2023 IEEE 47th Annual Computers, Software …, 2023
[8] Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding
Computers & Security, 2023
[9] NLP methods in host-based intrusion detection Systems: A systematic review and future directions
Journal of Network and Computer …, 2023
[10] Numerical feature selection and hyperbolic tangent feature scaling in machine learning-based detection of anomalies in the computer network behavior
Electronics, 2023
[11] A novel hybrid framework for cloud intrusion detection system using system call sequence analysis
Cluster Computing, 2023
[12] Optimizing intrusion detection systems using parallel metric learning
Computers and …, 2023
[13] Intelligent Mechanisms for Monitoring and Intrusion Detection in IoT Devices
2022
[14] Machine Learning Methods leveraging ADFA-LD Dataset for Anomaly Detection in Linux Host Systems
2022 2nd International …, 2022
[15] Interpretability and performance of deep neural network based anomaly detection in cyber security and telecommunications
2022
[16] A Framework for Analysis of Network Traffic Using Predictive Algorithm
… Conference on Computing …, 2022
[17] Computer network intrusion detection using cascade back propagation neural network
2022
[18] Comparison of System Call Sequence Embedding Approaches for Anomaly Detection
Journal of Convergence for Information …, 2022
[19] Creation of a Dataset Modeling the System Calls of Spectrum Sensors Affected by Malware
Bachelor Thesis, 2022
[20] Network intrusion detection via flow-to-image conversion
2022
[21] A Lightweight Host-Based Intrusion Detection System Using N-Gram and Perceptron Model for Internet of Things
2021
[22] An Intrusion Detection System on Fog Architecture
… Conference on Mobile Ad Hoc and …, 2021
[23] Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security
2021
[24] НАБОРЫ ДАННЫХ В ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ ДЛЯ АЛГОРИТМОВ МАШИННОГО ОБУЧЕНИЯ
2021
[25] Intrusion Detection Based on Sequential Information Preserving Log Embedding Methods and Anomaly Detection Algorithms
2021
[26] GAN based Augmentation for Improving Anomaly Detection Accuracy in Host-based Intrusion Detection Systems
International Journal of Engineering Research and Technology, 2020
[27] A new perspective towards the development of robust data-driven intrusion detection for industrial control systems
2020
[28] Comprehensive Review of Cybercrime Detection Techniques
2020
[29] procmonML: Generating evasion resilient host-based behavioral analytics from tree ensembles
2020
[30] A TfidfVectorizer and Singular Value Decomposition based host intrusion detection system framework for detecting anomalous system processes
2020
[31] A Novel Deep Intrusion Detection Model Based On a Convolutional Neural Network.
2019
[32] A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
2019
[33] Data security analysis based on Blockchain Recurrence Qualitative Analysis (BRQA)
2019
[34] Deep Learning Approach for Intelligent Intrusion Detection System
2019
[35] SON KULLANICILAR İÇİN ANOMALİ SALDIRI TESPİT SİSTEMLERİ
2019
[36] EVALUATION OF ANOMALY DETECTION APPROACHES USING SYSTEM CALL TRACES ON EMBEDDED LINUX SYSTEMS AND COMPARISON WITH …
2018
[37] COMBINATION OF MULTI-CHANNEL CNN AND BiLSTM FOR HOST-BASED INTRUSION DETECTION
2018
[38] EagleEye: A Novel Visual Anomaly Detection Method
2018
[39] Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms
Intelligent Data Analysis, 2018
[40] Sequence Covering for Efficient Host-Based Intrusion Detection
2017
[41] Machine Learning for Host-based Misuse and Anomaly Detection in UNIX Environment
Dissertation, University of Toledo, 2017
[42] Ensemble classifier for misuse detection using N-gram feature vectors through operating system call traces
International Journal of Hybrid Intelligent Systems, 2017
[43] Host based intrusion detection system using frequency analysis of n-gram terms
2017
[44] EVALUATING HOST-BASED INTRUSION DETECTION ON THE ADFA-WD AND ADFA-WD: SAA DATASETS
2017
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top