Related references
Note: Only part of the references are listed.Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices
Shuming Qiu et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection
Hanan Hindy et al.
ELECTRONICS (2020)
Cybersecurity data science: an overview from machine learning perspective
Iqbal H. Sarker et al.
JOURNAL OF BIG DATA (2020)
A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems
Hanan Hindy et al.
IEEE ACCESS (2020)
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
Hongyu Liu et al.
APPLIED SCIENCES-BASEL (2019)
Ensembles for feature selection: A review and future trends
Veronica Bolon-Canedo et al.
INFORMATION FUSION (2019)
Deep Learning Approach for Intelligent Intrusion Detection System
R. Vinayakumar et al.
IEEE ACCESS (2019)
Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset
Arif Yulianto et al.
2ND INTERNATIONAL CONFERENCE ON DATA AND INFORMATION SCIENCE (2019)
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography
Guosheng Xu et al.
SENSORS (2018)
Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey
Seyed Mohammad Ghaffarian et al.
ACM COMPUTING SURVEYS (2017)
Simultaneous feature selection and clustering using mixture models
MHC Law et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2004)
Unsupervised feature selection using feature similarity
P Mitra et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2002)