[1]
|
Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches.
|
|
… Materials & Continua,
2024 |
|
|
[2]
|
Vulnerability Detection in Cyber-Physical System Using Machine Learning
|
|
Scalable Computing: Practice and Experience,
2024 |
|
|
[3]
|
Optimal Attack or Malicious Activity Detection in VANET Using Ensemble Machine Learning Approach
|
|
International Journal of Intelligent …,
2024 |
|
|
[4]
|
26 Approach for Strengthening
|
|
Advances in Emerging …,
2024 |
|
|
[5]
|
Network intrusion detection method based on VAE-CWGAN and fusion of statistical importance of feature.
|
|
Journal on …,
2024 |
|
|
[6]
|
An Enhanced Intrusion Detection System Model Using Machine Learning Algorithm
|
|
2024 International Conference on …,
2024 |
|
|
[7]
|
基于 VAE-CWGAN 和特征统计重要性融合的网络入侵检测方法
|
|
通信学报,
2024 |
|
|
[8]
|
Intrusion Detection System Using Pca
|
|
Mathematical Statistician and …,
2023 |
|
|
[9]
|
Pot Hole Detection Using Deep Learning
|
|
Mathematical Statistician and …,
2023 |
|
|
[10]
|
Network Intrusion Detection using a Hybridized Harmony Search and Random Forest
|
|
2023 2nd International …,
2023 |
|
|
[11]
|
Novel Machine-Learning-Based Decision Support System for Fraud Prevention Check for updates
|
|
5th EAI International Conference …,
2023 |
|
|
[12]
|
Comparative Study of Machine Learning Techniques for Intrusion Detection on CICIDS-2017 Dataset
|
|
… on Computing for …,
2023 |
|
|
[13]
|
Intrusion detection and prevention with machine learning algorithms
|
|
International Journal of …,
2023 |
|
|
[14]
|
Improved Transformer-based Privacy-Preserving Architecture for Intrusion Detection in Secure V2X Communications
|
|
IEEE Transactions …,
2023 |
|
|
[15]
|
An advanced intrusion detection algorithm for network traffic using convolution neural network
|
|
2023 Fifth International …,
2023 |
|
|
[16]
|
Gene expression and metadata based identification of key genes for hepatocellular carcinoma using machine learning and statistical models
|
|
IEEE/ACM Transactions …,
2023 |
|
|
[17]
|
Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems
|
|
IEEE Internet of …,
2023 |
|
|
[18]
|
XA-GANomaly: An explainable adaptive semi-supervised learning method for intrusion detection using GANomaly
|
|
Computers, Materials and Continua,
2023 |
|
|
[19]
|
Aplicación de algoritmos de aprendizaje automático para la detección de anomalías de tráfico en entornos IoT
|
|
2023 |
|
|
[20]
|
Network Security Threats Detection Methods Based on Machine Learning Techniques
|
|
International Conference on Advanced Computing …,
2023 |
|
|
[21]
|
Anomaly Detection in Netflow Network Traffic Using Supervised Machine Learning Algorithms
|
|
Journal of Industrial Information Integration,
2023 |
|
|
[22]
|
Canet: A Hierarchical Cnn-Attention Model for Network Intrusion Detection
|
|
SSRN Electronic Journal,
2023 |
|
|
[23]
|
Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity
|
|
Applied Sciences,
2023 |
|
|
[24]
|
Optimal channels and features selection based adhd detection from eeg signal using statistical and machine learning techniques
|
|
IEEE Access,
2023 |
|
|
[25]
|
Differentially expressed discriminative genes and significant meta-hub genes based key genes identification for hepatocellular carcinoma using statistical machine …
|
|
Scientific Reports,
2023 |
|
|
[26]
|
Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring
|
|
Kadri - Computers & Security,
2023 |
|
|
[27]
|
Detecting anomalies and de-noising monitoring data from sensors: A smart data approach
|
|
Advanced Engineering …,
2023 |
|
|
[28]
|
A multiscale intrusion detection system based on pyramid depthwise separable convolution neural network
|
|
Neurocomputing,
2023 |
|
|
[29]
|
XA-GANOMALY: AN EXPLAINABLE ADAPTIVE SEMI-SUPERVISED LEARNING METHOD FOR INTRUSION DETECTION USING GANOMALY IN GLOBAL …
|
|
ЭКОНОМИЧЕСКАЯ СРЕДА,
2023 |
|
|
[30]
|
Handwriting-Based ADHD Detection for Children Having ASD Using Machine Learning Approaches
|
|
IEEE …,
2023 |
|
|
[31]
|
Efficient Feature Selection and Machine Learning Based ADHD Detection Using EEG Signal.
|
|
… , Materials & Continua,
2022 |
|
|
[32]
|
The sound of intrusion: A novel network intrusion detection system
|
|
Computers and Electrical …,
2022 |
|
|
[33]
|
NETWORK TRAFFIC DETECTION THROUGH MACHINE LEARNING
|
|
International Journal of Engineering Technology and Management Sciences,
2022 |
|
|
[34]
|
An Innovative Network Security Regulations Dependent on Improved Support Vector Machine from the Outlook of Modern Cities
|
|
Scientific Hub of Applied Research in …,
2022 |
|
|
[35]
|
IEEESEM
|
|
2022 |
|
|
[36]
|
Developing machine learning methods for classification and analysis of dichotic listening using neurophysiological data
|
|
2022 |
|
|
[37]
|
Shaping future low-carbon energy and transportation systems: Digital technologies and applications
|
|
iEnergy,
2022 |
|
|
[38]
|
Important Features Selection and Classification of Adult and Child from Handwriting Using Machine Learning Methods
|
|
Applied Sciences,
2022 |
|
|
[39]
|
Machine learning combating DOS and DDOS attacks
|
|
International Journal of …,
2022 |
|
|
[40]
|
Depression Anxiety Stress Scale and Handgrip using Machine Learning Analysis
|
|
2022 4th International …,
2022 |
|
|
[41]
|
Network intrusion detection using Machine Learning approach
|
|
Proceedings of the 12th …,
2022 |
|
|
[42]
|
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations
|
|
International Journal of …,
2022 |
|
|
[43]
|
Analyzing sensitivity of flood susceptible model in a flood plain river basin
|
|
Geocarto International,
2022 |
|
|
[44]
|
Assessing the Yield of Wheat Using Satellite Remote Sensing-Based Machine Learning Algorithms and Simulation Modeling
|
|
Remote Sensing,
2022 |
|
|
[45]
|
A hybrid machine learning model for intrusion detection in VANET
|
|
Computing,
2022 |
|
|
[46]
|
Intrusion detection of industrial internet-of-things based on reconstructed graph neural networks
|
|
IEEE Transactions on …,
2022 |
|
|
[47]
|
Identification of key candidate genes for IgA nephropathy using machine learning and statistics based bioinformatics models
|
|
Scientific Reports,
2022 |
|
|
[48]
|
RANet: Network intrusion detection with group-gating convolutional neural network
|
|
Journal of Network and …,
2022 |
|
|
[49]
|
Contextual anomaly detection on time series: a case study of metro ridership analysis
|
|
Neural Computing and …,
2022 |
|
|
[50]
|
Online Kanji Characters Based Writer Identification Using Sequential Forward Floating Selection and Support Vector Machine
|
|
Applied Sciences,
2022 |
|
|
[51]
|
Intelligent One-Class Classifiers for the Development of an Intrusion Detection System: The MQTT Case Study
|
|
Mata, H Alaiz-Moretón… - Electronics,
2022 |
|
|
[52]
|
SCADA Vulnerabilities and Attacks: A Review of the State-of-the-Art and Open Issues
|
|
Computers & Security,
2022 |
|
|
[53]
|
An Abnormal Traffic Detection Model Combined BiIndRNN With Global Attention
|
|
IEEE Access,
2022 |
|
|
[54]
|
Network intrusion detection based on conditional wasserstein variational autoencoder with generative adversarial network and one-dimensional …
|
|
Applied Intelligence,
2022 |
|
|
[55]
|
An Explainable Deep Neural Framework for Trustworthy Network Intrusion Detection
|
|
2022 10th IEEE International …,
2022 |
|
|
[56]
|
Network traffic verification based on a public dataset for IDS systems and machine learning classification algorithms
|
|
2022 45th Jubilee International …,
2022 |
|
|
[57]
|
Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting …
|
|
Wireless Personal …,
2022 |
|
|
[58]
|
Ensemble learning-based IDS for sensors telemetry data in IoT networks
|
|
Mathematical …,
2022 |
|
|
[59]
|
Balanced twin auto-encoder for iot intrusion detection
|
|
… 2022-2022 IEEE …,
2022 |
|
|
[60]
|
Wearable Internet of Medical Things (IoMT) 5G Secure Remote Monitoring System Model in Smart Cities
|
|
2022 |
|
|
[61]
|
Novel Machine-Learning-Based Decision Support System for Fraud Prevention
|
|
… Conference on Big Data Innovation for …,
2022 |
|
|
[62]
|
Detection of Traffic on the Network based on a Real Dataset for the IIM method and ML-TSDS Algorithm
|
|
2022 International Conference on Automation …,
2022 |
|
|
[63]
|
Intelligent One-Class Classifiers for the Development of an Intrusion Detection System: The MQTT Case Study. Electronics 2022, 11, 422
|
|
Mata,
2022 |
|
|
[64]
|
Efficient Feature Selection and Machine Learning Based ADHD Detection Using EEG Signal
|
|
Computers, Materials & Continua,
2022 |
|
|
[65]
|
Forecast and anomaly detection on time series with dynamic context: Application to the mining of transit ridership data
|
|
2021 |
|
|
[66]
|
A Review on Intrusion Detection System Using a Machine Learning Algorithms
|
|
International Conference on Emerging …,
2021 |
|
|
[67]
|
Comparing Methods of Feature Extraction of Brain Activities for Octave Illusion Classification Using Machine Learning
|
|
Sensors,
2021 |
|
|
[68]
|
Assessment of temporal probability for rainfall-induced landslides based on nonstationary extreme value analysis
|
|
Engineering Geology,
2021 |
|
|
[69]
|
ACGANs-CNN: A Novel Intrusion Detection Method
|
|
2021 |
|
|
[70]
|
A new approach to monitor water quality in the Menor sea (Spain) using satellite data and machine learning methods
|
|
2021 |
|
|
[71]
|
Forecast and anomaly detection on time series with dynamic context. Application to the mining of transit ridership data.
|
|
2021 |
|
|
[72]
|
DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors
|
|
2021 |
|
|
[73]
|
Resource Efficient Boosting Method for IoT Security Monitoring
|
|
2021 |
|
|
[74]
|
Intelligent Machine Learning Approach for CIDS—Cloud Intrusion Detection System
|
|
2021 |
|
|
[75]
|
Recent Advances in the Prediction of Protein Structural Classes: Feature Descriptors and Machine Learning Algorithms
|
|
2021 |
|
|
[76]
|
Intrusion Detection System for MQTT Protocol Based on Intelligent One-Class Classifiers
|
|
Mata, H Alaiz-Moretón… - Sustainable Smart Cities …,
2021 |
|
|
[77]
|
Machine Learning for Threat Recognition in Critical Cyber-Physical Systems
|
|
2021 IEEE International …,
2021 |
|
|
[78]
|
A Tree Based Machine Learning and Deep Learning Classification for Network Intrusion Detection
|
|
Avrupa Bilim ve Teknoloji Dergisi,
2021 |
|
|
[79]
|
Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection
|
|
2021 International Conference …,
2021 |
|
|
[80]
|
A Powerful Ensemble Learning Approach for Improving Network Intrusion Detection System (NIDS)
|
|
2021 Fifth International …,
2021 |
|
|
[81]
|
IoT Dataset Validation Using Machine Learning Techniques for Traffic Anomaly Detection
|
|
Electronics,
2021 |
|
|
[82]
|
Transferability of Intrusion Detection Systems Using Machine Learning between Networks
|
|
2021 |
|
|
[83]
|
A Machine Learning Approach for Uniform Intrusion Detection
|
|
2021 |
|
|
[84]
|
Identificação das Dunas do Atacama (Norte do Chile) a partir da avaliação de três algoritmos no Google Earth Engine
|
|
Revista Brasileira de …,
2021 |
|
|
[85]
|
PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks
|
|
arXiv preprint arXiv …,
2021 |
|
|
[86]
|
Anomaly Detection in Network Intrusion Detection Systems Using Machine Learning and Dimensionality Reduction
|
|
Ajala - Sage Science Review of Applied …,
2021 |
|
|
[87]
|
Advances in Modelling and Analysis B
|
|
Journal homepage: http://iieta …,
2020 |
|
|
[88]
|
Retracted: DETECTING ATTACKS ON MQTT-IOT PROTOCOL USING ML TECHNIQUES
|
|
2020 |
|
|
[89]
|
Reliable Forest Fire Detection System Using Wireless Sensor Networks and Internet of Things
|
|
2020 |
|
|
[90]
|
Using Parametric t-Distributed Stochastic Neighbor Embedding Combined with Hierarchical Neural Network for Network Intrusion Detection.
|
|
2020 |
|
|
[91]
|
A Comparative Theoretical and Empirical Analysis of Machine Learning Algorithms
|
|
2020 |
|
|
[92]
|
Intrusion detection of imbalanced network traffic based on machine learning and deep learning
|
|
2020 |
|
|
[93]
|
Attackers are not stealthy: Statistical analysis of the well-known and infamous KDD network security dataset
|
|
2020 |
|
|
[94]
|
Assessment of Machine Learning Techniques for Building an Efficient IDS
|
|
2020 |
|
|
[95]
|
A Two Layer Machine Learning System for Intrusion Detection Based on Random Forest and Support Vector Machine
|
|
2020 |
|
|
[96]
|
A Semi-supervised Intrusion Detection Algorithm Based on Auto-encoder
|
|
2020 |
|
|
[97]
|
A Comparative Theoretical and Empirical Analysis of Machine Learning Algorithms.
|
|
Webology,
2020 |
|
|
[98]
|
Predictor selection and attack classification using random forest for intrusion detection
|
|
2020 |
|
|
[99]
|
A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms
|
|
2020 |
|
|
[100]
|
Computational method to prove efficacy of datasets
|
|
2020 |
|
|
[101]
|
IGAN-IDS: An Imbalanced Generative Adversarial Network towards Intrusion Detection System in Ad-hoc Networks
|
|
2020 |
|
|
[102]
|
Learning dispatching rules for single machine scheduling with dynamic arrivals based on decision trees and feature construction
|
|
2020 |
|
|
[103]
|
Application of remote sensing techniques and machine learning algorithms in dust source detection and dust source susceptibility mapping
|
|
2020 |
|
|
[104]
|
Machine Learning Method for Cyber Security Intrusion Detection for Industrial Control Systems (ICSS)
|
|
2020 |
|
|
[105]
|
Tuning to Optimize SVM Approach for Breast Cancer Diagnosis with Blood Analysis Data
|
|
2020 |
|
|
[106]
|
Dimensionality Reduction for DDOS Database Using PCA
|
|
2020 |
|
|
[107]
|
Implementation of Random Forest and proposal of Borda Count in credit card fraud detection
|
|
Int. J. Emerging …,
2020 |
|
|
[108]
|
基于元优化的 KNN 入侵检测模型.
|
|
Journal of Beijing …,
2020 |
|
|
[109]
|
Hybrid framework for intrusion detection system using ensemble approach
|
|
International Journal of Advanced …,
2020 |
|
|
[110]
|
Hybrid Architecture for Distributed Intrusion Detection System Using Semisupervised Classifiers in Ensemble Approach
|
|
Advances in Modelling and Analysis B,
2020 |
|
|
[111]
|
Systematic Literature Survey on IDS Based on Data Mining
|
|
2019 |
|
|
[112]
|
Improving Situation Awareness Through Monitoring Data Correlation
|
|
2019 |
|
|
[113]
|
SIGMA: Strengthening IDS with GAN and Metaheuristics Attacks
|
|
2019 |
|
|
[114]
|
A Machine Learning Approach for Network Traffic Analysis using Random Forest Regression
|
|
ACET Journal of Computer Education & Research,
2019 |
|
|
[115]
|
Fuzzy Automaton-based Early Detection Model
|
|
2019 |
|
|
[116]
|
An Intrusion Detection Model based on a Convolutional Neural Network
|
|
2019 |
|
|
[117]
|
Exploration of Cervical Myelopathy Location From Somatosensory Evoked Potentials Using Random Forests Classification
|
|
2019 |
|
|
[118]
|
Intensive Pre-Processing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques
|
|
2019 |
|
|
[119]
|
Ensemble-based semi-supervised learning approach for a distributed intrusion detection system
|
|
2019 |
|
|
[120]
|
Rade: Resource-efficient supervised anomaly detection using decision tree-based ensemble methods
|
|
2019 |
|
|
[121]
|
Hybrid Architecture for Distributed Intrusion Detection System.
|
|
2019 |
|
|
[122]
|
Multiclass classification procedure for detecting attacks on MQTT-IoT protocol
|
|
2019 |
|
|
[123]
|
A Novel Intrusion Detector Based on Deep Learning Hybrid Methods
|
|
2019 |
|
|
[124]
|
Analysis of NSL KDD Dataset Using Classification Algorithms for Intrusion Detection System
|
|
2019 |
|
|
[125]
|
A Data-Driven Network Intrusion Detection Model Based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection
|
|
2019 |
|
|
[126]
|
Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc Networks
|
|
2019 |
|
|
[127]
|
Special Issue on Using Machine Learning Algorithms in the Prediction of Kyphosis Disease: A Comparative Study
|
|
2019 |
|
|
[128]
|
Hybrid Architecture for Distributed Intrusion Detection System
|
|
Ingénierie des Systèmes d’Information (ISI),
2019 |
|
|
[129]
|
ANID-SEoKELM: Adaptive network intrusion detection based on selective ensemble of kernel ELMs with random features
|
|
2019 |
|
|
[130]
|
Apache spark ve makine öğrenmesi algoritmaları ile ağ saldırısı tespiti
|
|
2019 |
|
|
[131]
|
Classifying Building Usages: A Machine Learning Approach on Building Extractions
|
|
2018 |
|
|
[132]
|
Coupled Kernel Ensemble Regression
|
|
International Journal of Computer Applications,
2018 |
|
|
[133]
|
Securing Big Data Ecosystem with NSGA-II and Gradient Boosted Trees Based NIDS Using Spark
|
|
2018 |
|
|
[134]
|
Comparison of Performance Between Incremental and Batch Learning Method for Information Analysis of Cyber Surveillance and Reconnaissance
|
|
2018 |
|
|
[135]
|
DoS Attack Detection Using Machine Learning and Neural Network
|
|
2018 |
|
|
[136]
|
Co-regularized kernel ensemble regression
|
|
World Wide Web,
2018 |
|
|
[137]
|
Semi-Supervised Machine Learning for Network Intrusion Detection
|
|
ProQuest Dissertations Publishing,
2018 |
|
|
[138]
|
Applying Machine Learning to Advance Cyber Security: Network Based Intrusion Detection Systems
|
|
2018 |
|
|
[139]
|
NIDS: Neural Network based Intrusion Detection System
|
|
2018 |
|
|
[140]
|
An Abnormal Behavior Detection Based on Deep Learning
|
|
2018 |
|
|
[141]
|
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks
|
|
2018 |
|
|
[142]
|
Classification of Human Daily Activities Using Ensemble Methods Based on Smartphone Inertial Sensors
|
|
2018 |
|
|
[143]
|
An Effective Way of Cloud Intrusion Detection System Using Decision tree, Support Vector Machine and Naïve Bayes Algorithm
|
|
2018 |
|
|
[144]
|
Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning
|
|
2018 |
|
|
[145]
|
Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques
|
|
2018 |
|
|
[146]
|
WebAD: A Cascading Model Based on Machine Learning for Web Attacks Detection
|
|
Security and Privacy in Communication Networks,
2018 |
|
|
[147]
|
A novel method combining fuzzy SVM and sampling for imbalanced classification
|
|
International Journal of Applied Systemic Studies,
2018 |
|
|
[148]
|
LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network
|
|
Security and Communication Networks,
2018 |
|
|
[149]
|
Network Intrusion Detection on Apache Spark with Machine Learning Algorithms
|
|
Engineering Applications of Neural Networks,
2018 |
|
|
[150]
|
Significant Metabolites and Outlier-Robust Classifier Identification for Breast Cancer Prediction
|
|
Current Metabolomics,
2018 |
|
|
[151]
|
Machine learning classifiers for network intrusion detection
|
|
… Conference on Applied Cognitive Computing (ACC'18),
2018 |
|
|
[152]
|
Modified stacking ensemble machine learning method for network intrusion detection
|
|
2018 |
|
|
[153]
|
Addressing challenges in big data intrusion detection system using machine learning techniques
|
|
Int J Comput Sci Eng,
2017 |
|
|
[154]
|
Semi-supervised Random Forest for Intrusion Detection Network.
|
|
MAICS,
2017 |
|
|
[155]
|
iMulti-HumPhos: a multi-label classifier for identifying human phosphorylated proteins using multiple kernel learning based support vector machines
|
|
2017 |
|
|
[156]
|
Prediction of protein subcellular localization using support vector machine with the choice of proper kernel
|
|
2017 |
|
|
[157]
|
Improve Radiologists Productivity in Hospitals Based on Data Mining Techniques
|
|
2017 |
|
|
[158]
|
Improve Radiologists Productivity in Hospitals Based on Data Mining Techniques تاينقت مادختساب تايفشتسملا يف ةعشلأا ءابطأ ةيجاتنإ نيسحت بيقنت …
|
|
2017 |
|
|
[159]
|
Protein subcellular localization prediction using multiple kernel learning based support vector machine
|
|
Molecular BioSystems,
2017 |
|
|
[160]
|
iMulti-HumPhos: A Multi-Label Classifier for Identifying Human Phosphorylated Proteins Using Multiple Kernel Learning Based Support Vector Machine
|
|
Molecular BioSystems,
2017 |
|
|
[161]
|
A Novel Unsupervised Anomaly Detection Approach for Intrusion Detection System
|
|
2017 |
|
|
[162]
|
HAST-IDS: Learning Hierarchical Spatial-Temporal Features using Deep Neural Networks to Improve Intrusion Detection
|
|
2017 |
|
|
[163]
|
Semi-supervised Random Forest for Intrusion Detection Network
|
|
MAICS,
2017 |
|
|
[164]
|
A novel network security algorithm based on improved support vector machine from smart city perspective
|
|
Computers & Electrical Engineering,
2017 |
|
|
[165]
|
Multi-Task Learning for Intrusion Detection on web logs
|
|
Journal of Systems Architecture,
2017 |
|
|
[166]
|
A comparative study of logistic model tree, random forest, and classification and regression tree models for spatial prediction of landslide susceptibility
|
|
CATENA,
2017 |
|
|
[167]
|
predCar-site: Carbonylation sites prediction in proteins using support vector machine with resolving data imbalanced issue
|
|
Analytical Biochemistry,
2017 |
|
|
[168]
|
Cyber-physical intrusion detection for robotic vehicles
|
|
2017 |
|
|
[169]
|
Study on credit evaluation of electricity users based on random forest
|
|
2017 |
|
|
[170]
|
An approach to develop a hybrid algorithm based on support vector machine and Naive Bayes for anomaly detection
|
|
2017 International Conference on …,
2017 |
|
|
[171]
|
多断面相关性区间预测法在短期交通流预测中的应用
|
|
电子设计工程,
2017 |
|
|
[172]
|
Multiple Kernel Learning And Its Application In Bioinformatics
|
|
2017 |
|
|
[173]
|
Identifying Intrusions in Computer Networks using Principal Component Analysis and Random Forest
|
|
International Journal of Computer Science and Information Security,
2016 |
|
|
[174]
|
Semi-Supervised Deep Neural Network for Network Intrusion Detection
|
|
2016 |
|
|
[175]
|
Relationship between Effective Application of Machine Learning and Malware Detection: A Quantitative Study
|
|
ProQuest Dissertations Publishing,
2016 |
|
|
[176]
|
Detecting Distributed Denial of Service Attacks Using Data Mining Techniques
|
|
2016 |
|
|
[177]
|
Towards a multi‐layers anomaly detection framework for analyzing network traffic
|
|
Concurrency and computation: practice and experience,
2016 |
|
|
[178]
|
Data Driven Physical Modelling For Intrusion Detection In Cyber Physical Systems
|
|
2016 |
|
|
[179]
|
A Granular Classifier By Means of Context-based Similarity Clustering
|
|
J Electr Eng Technol.,
2016 |
|
|
[180]
|
Anomaly Detection with ANN and SVM for Telemedicine Networks
|
|
International Journal of Computer, Electrical, Automation, Control and Information Engineering,
2016 |
|
|
[181]
|
A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system
|
|
International Journal of Internet Technology and Secured Transactions,
2016 |
|
|
[182]
|
Random forest modeling for network intrusion detection system
|
|
Procedia Computer Science,
2016 |
|
|
[183]
|
Data Driven Physical Modelling For Intrusion Detection In Cyber Physical Systems.
|
|
2016 |
|
|
[184]
|
Applying Big Data Analytics Into Network Security: Challenges, Techniques and Outlooks
|
|
2016 |
|
|
[185]
|
Performance evaluation of different kernels for support vector machine used in intrusion detection system
|
|
International Journal of …,
2016 |
|
|
[186]
|
FUZZY BASED SUPPORT VECTOR MACHINE CLASSIFIER WITH WIENER FILTER (FSVM-WF) FOR INTRUSION DETECTION SYSTEM.
|
|
International Journal of …,
2016 |
|
|
[187]
|
AN APPROACH TO DEVELOP THE HYBRID ALGORITHM BASED ON SUPPORT VECTOR MACHINE AND NAÏVE BAYES FOR ANOMALY DETECTION
|
|
2016 |
|
|
[188]
|
基于随机森林和加权 K 均值聚类的网络入侵检测系统
|
|
微型电脑应用,
2016 |
|
|
[189]
|
Improved Extreme Learning Machine (IELM) Classifier For Intrusion Detection System
|
|
… of Engineering Trends and Technology (IJETT …,
2016 |
|
|
[190]
|
Intrusion detection system using machine learning models
|
|
2015 |
|
|
[191]
|
KDD CUP 99 Data Set を用いた異なる学習データによる機械学習アルゴリズムの評価
|
|
コンピュータセキュリティシンポジウム 2015 …,
2015 |
|
|
[192]
|
一种基于高斯核支持向量机的非结构化道路环境植被检测方法
|
|
机器人,
2015 |
|
|
[193]
|
A Novel Anomaly Detection Approach for Mitigating Web-Based Attacks Against Clouds
|
|
2015 |
|
|
[194]
|
An anamoly based Intrusion Detection System for mobile ad-hoc networks using genetic algorithm based support vector machine
|
|
Advances in Natural and Applied Sciences,
2015 |
|
|
[195]
|
Hybrid Modified-Means with C4. 5 for Intrusion Detection Systems in Multiagent Systems
|
|
The Scientific World Journal,
2015 |
|
|
[196]
|
An information hiding system based on high frame rate video
|
|
2015 |
|
|
[197]
|
Application of a Novel Multiple Kernel Learning Framework for Improving the Robustness of Network Intrusion Detection
|
|
ProQuest Dissertations Publishing,
2015 |
|
|
[198]
|
Hybrid Modified 𝐾-Means with C4. 5 for Intrusion Detection Systems in Multiagent Systems
|
|
2015 |
|
|
[199]
|
Research Article Hybrid Modified 𝐾-Means with C4. 5 for Intrusion Detection Systems in Multiagent Systems
|
|
Yaseen, ZA Othman,
2015 |
|
|
[200]
|
Hybrid modified K-Means with C4. 5 for intrusion detection systems in multiagent systems
|
|
Yaseen, ZA Othman… - The Scientific World …,
2015 |
|
|
[201]
|
An Integrated Approach for Intrusion Detection using Computational Methods
|
|
Indian Journal of Science and Technology,
2015 |
|
|
[202]
|
An evolutionary fuzzy genetic and Naïve Bayesian approach for multivariate data classification
|
|
Computer and Information Technology (ICCIT), 2014 17th International Conference on,
2014 |
|
|
[203]
|
An Evolutionary Fuzzy Genetic and Na?ve Bayesian Approach for Multivariate Data Classification
|
|
2014 |
|
|
[204]
|
MARK-ELM: Application of a Novel Multiple Kernel Learning Framework for Improving the Robustness of Network Intrusion Detection
|
|
Expert Systems with Applications,
2014 |
|
|
[205]
|
Segmenting neurons in electronic microscopy via geometric tracing
|
|
… International Conference on …,
1998 |
|
|
[206]
|
Approach for Strengthening the Network Security Based on Boosting Algorithms: Performance Study
|
|
|
|
|
[207]
|
International Journal of Computer Networks & Communications (IJCNC)
|
|
|
|
|
[208]
|
INTEGRATED MODEL FOR HANDLING ABNORMAL NETWORK CONNECTIONS USING PARALLELIZING KMeans (PKM) CLUSTERING AND BIG DATA …
|
|
Dubai, VT Humbe
|
|
|
[209]
|
Performance Analysis of Chi-Square Integration with Ensemble and Neural Network Based Intrusion Detection System: A Comparative Study
|
|
|
|
|
[210]
|
Análise estatística sobre o conjunto de dados de segurança de redes KDD-99 para o desenvolvimento de um sistema de segurança usando aprendizado …
|
|
|
|
|
[211]
|
TURNOVER PREDICTION OF SHARES USING DATA MINING TECHNIQUES: A CASE STUDY
|
|
|
|
|
[212]
|
基於輪廓分析識別內部威脅
|
|
|
|
|
[213]
|
基於離散小波轉換與側寫分析的主機風險評估平台
|
|
|
|
|