International Journal of Communications, Network and System Sciences

International Journal of Communications, Network and System Sciences

ISSN Print: 1913-3715
ISSN Online: 1913-3723
www.scirp.org/journal/ijcns
E-mail: ijcns@scirp.org
"An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm"
written by L Prema RAJESWARI, Kannan ARPUTHARAJ,
published by International Journal of Communications, Network and System Sciences, Vol.1 No.4, 2008
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Hybrid Cloud Data Protection Using Machine Learning Approach
… Techniques in Data …, 2021
[2] Building an Effective Intrusion Detection System using combined Signature and Anomaly Detection Techniques
International Journal of Innovative Technology and Exploring Engineering, 2019
[3] Towards Efficient Intrusion Detection using Hybrid Data Mining Techniques
2019
[4] Sentiment analysis in data of twitter using machine learning algorithms
2019
[5] Decision Tree and Genetic Algorithm Based Intrusion Detection System
Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017), 2019
[6] Wise intrusion detection system using fuzzy rough set-based feature extraction and classification algorithms
2019
[7] Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs
2019
[8] Evolutionary Decision Tree-Based Intrusion Detection System
2019
[9] Intrusion Detection System using Fuzzy Rough Set Feature Selection and Modified KNN Classifier
2019
[10] Network anomaly detection based on logistic regression of nonlinear chaotic invariants
2019
[11] Building an Effective Intrusion Detection System using Genetic Algorithm based Feature Selection
2018
[12] Developing an intrusion finding model using a search based feature selection algorithm
International Journal of Innovative Research & Studies, 2018
[13] Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review
2018
[14] A machine learning application for reducing the security risks in hybrid cloud networks
Multimedia Tools and Applications, 2018
[15] Network Traffic Classification Using Multiclass Classifier
Advances in Computing and Data Sciences, 2018
[16] Construction of Recognition Methodology using Genetic Algorithm
2017
[17] IMPLEMENTING AN INTRUSION DETECTION METHOD USING A FILTER BASED FEATURE SELECTION ALGORITHM
International Journal for Innovative Engineering and Management Research, 2017
[18] A C4. 5 algorithm for english emotional classification
Evolving Systems, 2017
[19] PRODUCTIVITY INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
2017
[20] A short-term marginal price forecasting model based on ensemble learning
2017
[21] Anomaly based Malicious Traic Identification using Kernel Extreme Machine Learning (KELM) Classifier and Kernel Principal Component Analysis (KPCA)
2016
[22] Artifical immune system using Genetic Algorithm and decision tree
2016
[23] Never Ignore the Significance of Different Anomalies: A Cost-Sensitive Algorithm Based on Loss Function for Anomaly Detection
2015
[24] A Novel Cloud Intrusion Detection System Using Feature Selection and Classification
International Journal of Intelligent Information Technologies (IJIIT), 2015
[25] Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System
International Journal of Computer Network and Information Security (IJCNIS), 2015
[26] Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCA
Security in Computing and Communications, 2015
[27] INTELLIGENT NETWORK-MISUSE-DETECTION-SYSTEM USING NEUROTREE CLASSIFIER
Neural Network World, 2015
[28] RBDT: The Cascading of Machine Learning Classifiers for Anomaly Detection with Case Study of Two Datasets
Advances in Intelligent Informatics, 2015
[29] Application of Intelligent Systems in Network Security: Intrusion Detection Systems and Firewalls
M Culhane, 2014
[30] Intelligent access control and intrusion detection techniques For web database security
2014
[31] Data mining approach for hybrid intrusion detection system
2014
[32] Applying non-negative matrix factorization methods to discover user; s resource access patterns for computer security tasks
Hybrid Intelligent Systems (HIS), 2014 14th International Conference on, 2014
[33] Anomaly detection using machine learning with a case study
Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on, 2014
[34] Enhancing the precision of phishing classification accuracy using reduced feature set and boosting algorithm
Advanced Computing (ICoAC), 2014 Sixth International Conference on, 2014
[35] Intrusion Detection-A Comparative Analysis using Classification Algorithms
Networking and Communication Engineering, 2013
[36] An Intelligent CRF Based Feature Selection for Effective Intrusion Detection
2013
[37] An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier
Advanced Computing (ICoAC), 2013 Fifth International Conference on, 2013
[38] Experiments on detection of Denial of Service attacks using REPTree
Green Computing, Communication and Conservation of Energy (ICGCE), 2013 International Conference on. IEEE, 2013., 2013
[39] Intelligent algorithms for effective network intrusion detection
2013
[40] Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS)
International Journal of Computer Applications, 2013
[41] Decision tree based light weight intrusion detection using a wrapper approach
Expert Systems with applications, 2012
[42] Evolving optimised decision rules for intrusion detection using particle swarm paradigm
International Journal of Systems Science, 2012
[43] Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems
arXiv preprint arXiv:1210.7650, 2012
[44] Identifying Intrusion Patterns using a Decision Tree.
International Journal of Computer Applications?, 2012
[45] Identifying Intrusion Patterns using a Decision Tree
International Journal of Computer Applications, 2012
[46] Analisis Dan Implementasi Random Forest dan Classification dan Regression Tree (CART) untuk Klasifikasi pada Misuse Intrusion Detection System
2011
[47] Designing a Hybrid Classifier for Network Intrusion Detection System
Thesis, 2011
[48] Hybrid Multi-level Intrusion Detection System
International J. Computer Science and Information Security?, 2011
[49] Implementation of Intelligent Techniques for Intrusion Detection Systems
2011
[50] INTRUSION DETECTION SYSTEM USING CONDITIONAL RANDOM FIELD ALGORITHM
BV RAMUDU, M INAYATHULLA, MP RAO
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top