Related references
Note: Only part of the references are listed.An active multi-class classification using privileged information and belief function
Mitra Javid et al.
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2020)
An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset
Hongpo Zhang et al.
COMPUTER NETWORKS (2020)
A holistic review of Network Anomaly Detection Systems: A comprehensive survey
Nour Moustafa et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
Identification of uncertainty and decision boundary for SVM classification training using belief function
Javad Hamidzadeh et al.
APPLIED INTELLIGENCE (2019)
An intrusion detection system for connected vehicles in smart cities
Moayad Aloqaily et al.
AD HOC NETWORKS (2019)
Deep Learning Approach for Intelligent Intrusion Detection System
R. Vinayakumar et al.
IEEE ACCESS (2019)
An enhanced J48 classification algorithm for the anomaly intrusion detection systems
Shadi Aljawarneh et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
An Adaptive Ensemble Machine Learning Model for Intrusion Detection
Xianwei Gao et al.
IEEE ACCESS (2019)
Instances selection algorithm by ensemble margin
Meryem Saidi et al.
JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE (2018)
Nearest neighbors based density peaks approach to intrusion detection
Lixiang Li et al.
CHAOS SOLITONS & FRACTALS (2018)
Ensemble weighted extreme learning machine for imbalanced data classification based on differential evolution
Yong Zhang et al.
NEURAL COMPUTING & APPLICATIONS (2017)
A survey of intrusion detection in Internet of Things
Bruno Bogaz Zarpelao et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
Wenjuan Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
A novel SVM-kNN-PSO ensemble method for intrusion detection system
Abdulla Amin Aburomman et al.
APPLIED SOFT COMPUTING (2016)
A survey of network anomaly detection techniques
Mohiuddin Ahmed et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Intelligent laser welding through representation, prediction, and control learning: An architecture with deep neural networks and reinforcement learning
Johannes Guenther et al.
MECHATRONICS (2016)
New Hermite orthogonal polynomial kernel and combined kernels in Support Vector Machine classifier
Vahid Hooshmand Moghaddam et al.
PATTERN RECOGNITION (2016)
Large symmetric margin instance selection algorithm
Javad Hamidzadeh et al.
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2016)
An intrusion detection system using network traffic profiling and online sequential extreme learning machine
Raman Singh et al.
EXPERT SYSTEMS WITH APPLICATIONS (2015)
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
Wei-Chao Lin et al.
KNOWLEDGE-BASED SYSTEMS (2015)
Deep learning in neural networks: An overview
Juergen Schmidhuber
NEURAL NETWORKS (2015)
Improved churn prediction in telecommunication industry using data mining techniques
A. Keramati et al.
APPLIED SOFT COMPUTING (2014)
A Survey of Intrusion Detection System using Case StudyKuwait Governments Entiteis
Khalid Abdulkareem Al-Enezi et al.
3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014 (2014)
A probabilistic approach for representation of interval uncertainty
Kais Zaman et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2011)
Use of K-Nearest Neighbor classifier for intrusion detection
YH Liao et al.
COMPUTERS & SECURITY (2002)