4.6 Article

Ensemble classification for intrusion detection via feature extraction based on deep Learning

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

An active multi-class classification using privileged information and belief function

Mitra Javid et al.

INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2020)

Review Computer Science, Hardware & Architecture

A holistic review of Network Anomaly Detection Systems: A comprehensive survey

Nour Moustafa et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

Identification of uncertainty and decision boundary for SVM classification training using belief function

Javad Hamidzadeh et al.

APPLIED INTELLIGENCE (2019)

Article Computer Science, Information Systems

An intrusion detection system for connected vehicles in smart cities

Moayad Aloqaily et al.

AD HOC NETWORKS (2019)

Article Computer Science, Information Systems

Deep Learning Approach for Intelligent Intrusion Detection System

R. Vinayakumar et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An enhanced J48 classification algorithm for the anomaly intrusion detection systems

Shadi Aljawarneh et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

An Adaptive Ensemble Machine Learning Model for Intrusion Detection

Xianwei Gao et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

Instances selection algorithm by ensemble margin

Meryem Saidi et al.

JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE (2018)

Article Mathematics, Interdisciplinary Applications

Nearest neighbors based density peaks approach to intrusion detection

Lixiang Li et al.

CHAOS SOLITONS & FRACTALS (2018)

Article Computer Science, Artificial Intelligence

Ensemble weighted extreme learning machine for imbalanced data classification based on differential evolution

Yong Zhang et al.

NEURAL COMPUTING & APPLICATIONS (2017)

Review Computer Science, Hardware & Architecture

A survey of intrusion detection in Internet of Things

Bruno Bogaz Zarpelao et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

Wenjuan Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

A novel SVM-kNN-PSO ensemble method for intrusion detection system

Abdulla Amin Aburomman et al.

APPLIED SOFT COMPUTING (2016)

Review Computer Science, Hardware & Architecture

A survey of network anomaly detection techniques

Mohiuddin Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

New Hermite orthogonal polynomial kernel and combined kernels in Support Vector Machine classifier

Vahid Hooshmand Moghaddam et al.

PATTERN RECOGNITION (2016)

Article Computer Science, Artificial Intelligence

Large symmetric margin instance selection algorithm

Javad Hamidzadeh et al.

INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2016)

Article Computer Science, Artificial Intelligence

An intrusion detection system using network traffic profiling and online sequential extreme learning machine

Raman Singh et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Artificial Intelligence

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

Wei-Chao Lin et al.

KNOWLEDGE-BASED SYSTEMS (2015)

Review Multidisciplinary Sciences

Deep learning

Yann LeCun et al.

NATURE (2015)

Review Computer Science, Artificial Intelligence

Deep learning in neural networks: An overview

Juergen Schmidhuber

NEURAL NETWORKS (2015)

Article Computer Science, Artificial Intelligence

Improved churn prediction in telecommunication industry using data mining techniques

A. Keramati et al.

APPLIED SOFT COMPUTING (2014)

Proceedings Paper Computer Science, Theory & Methods

A Survey of Intrusion Detection System using Case StudyKuwait Governments Entiteis

Khalid Abdulkareem Al-Enezi et al.

3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014 (2014)

Article Engineering, Industrial

A probabilistic approach for representation of interval uncertainty

Kais Zaman et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2011)

Article Computer Science, Information Systems

Use of K-Nearest Neighbor classifier for intrusion detection

YH Liao et al.

COMPUTERS & SECURITY (2002)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)