4.6 Article

An Ensemble of Prediction and Learning Mechanism for Improving Accuracy of Anomaly Detection in Network Intrusion Environments

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

A task orchestration approach for efficient mountain fire detection based on microservice and predictive analysis in IoT environment

Imran et al.

Summary: The paper discusses the issue of mountain fire detection and prevention, proposing a real-time IoT application to optimize notification time and detect mountain fires at the earliest stage for predictive analysis to prevent damage. The proposed mechanism is based on microservice-based IoT task orchestration and device virtualization, focusing on minimizing latency and executing tasks with guaranteed execution.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2021)

Article Green & Sustainable Science & Technology

Towards Mountain Fire Safety Using Fire Spread Predictive Analytics and Mountain Fire Containment in IoT Environment

Imran et al.

Summary: This paper proposes a three-fold methodology for fire safety in mountain areas, including an optimization model, an ensemble prediction model, and an Internet of Things-based task orchestration approach. The proposed method aims to minimize damage caused by mountain fires and provide timely information to safety authorities for efficient mountain fire safety management. Evaluation results show that the proposed fire safety mechanism is effective in enhancing mountain fire safety.

SUSTAINABILITY (2021)

Article Multidisciplinary Sciences

Health Monitoring System for Elderly Patients Using Intelligent Task Mapping Mechanism in Closed Loop Healthcare Environment

Imran et al.

Summary: The aging population's growth has direct impacts on the socio-economic structure of countries, while advancements in medical technologies and nutritional science are increasing human life expectancy. The Internet of Things has expanded health monitoring applications, utilizing wearable biomedical sensors and machine learning algorithms for effective monitoring of elderly patients' health conditions.

SYMMETRY-BASEL (2021)

Review Automation & Control Systems

Supervised feature selection techniques in network intrusion detection: A critical review

M. Di Mauro et al.

Summary: Machine Learning techniques are becoming increasingly important in network intrusion detection for uncovering hidden cyber-threats in abnormal flows. However, dealing with the vast diversity and number of features in data traffic is a challenging problem.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2021)

Article Chemistry, Multidisciplinary

WR-SVM Model Based on the Margin Radius Approach for Solving the Minimum Enclosing Ball Problem in Support Vector Machine Classification

Atif Rizwan et al.

Summary: In this research study, a novel weighted radius SVM (WR-SVM) is proposed to determine the tighter bounds of MEB. The experimental results reveal that the proposed WR-SVM significantly performed well compared to the conventional SVM classifier.

APPLIED SCIENCES-BASEL (2021)

Review Computer Science, Information Systems

A Topical Review on Machine Learning, Software Defined Networking, Internet of Things Applications: Research Limitations and Challenges

Imran et al.

Summary: Recent years have seen rapid development in Internet of Things communication technologies, infrastructure, and physical resource management. The application of software-defined networking and machine learning techniques has made network decisions more intelligent and robust. While IoT applications have adopted virtualization of resources and software-defined networking policies, alignment of SDN and IoT requirements is necessary for successful adaptations.

ELECTRONICS (2021)

Article Energy & Fuels

An Ensemble Energy Consumption Forecasting Model Based on Spatial-Temporal Clustering Analysis in Residential Buildings

Anam-Nawaz Khan et al.

Summary: A spatial and temporal ensemble forecasting model is proposed for short-term electric consumption forecasting in residential buildings, utilizing deep learning algorithms at different spatial scales. Experimental results demonstrate superior performance of the proposed model compared to other machine learning and deep learning variants, achieving lower forecasting errors at building and floor levels.

ENERGIES (2021)

Article Chemistry, Analytical

A Scheduling Mechanism Based on Optimization Using IoT-Tasks Orchestration for Efficient Patient Health Monitoring

Naeem Iqbal et al.

Summary: This study introduces a smart patient health monitoring system based on an optimized scheduling mechanism and real-time IoT-based task orchestration architecture to monitor vital signs data of remote patients effectively.

SENSORS (2021)

Article Computer Science, Information Systems

One-Dimensional CNN Approach for ECG Arrhythmia Analysis in Fog-Cloud Environments

Omar Cheikhrouhou et al.

Summary: A modular one-dimensional convolution neural network approach is proposed in this study for ECG signal analysis, deployable over Fog infrastructure to initiate emergency countermeasures within minimum delay. The approach achieves high accuracy on the MIT-BIH Arrhythmia database and shows a 25% improvement in overall response time when implemented on a hybrid Fog-Cloud infrastructure.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

An Advanced Abnormal Behavior Detection Engine Embedding Autoencoders for the Investigation of Financial Transactions

Konstantinos Demestichas et al.

Summary: Criminals are increasingly using new technologies for unlawful purposes, urging law enforcement agencies to stay ahead with tools and technology. The framework in this paper combines algorithms and tools for discovering and recording forensic evidence, along with machine learning techniques for trend detection.

INFORMATION (2021)

Article Computer Science, Artificial Intelligence

Nonlinear CNN: improving CNNs with quadratic convolutions

Yiyang Jiang et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

Arwa Aldweesh et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Computer Science, Artificial Intelligence

Detection of Thin Boundaries between Different Types of Anomalies in Outlier Detection Using Enhanced Neural Networks

Rasoul Kiani et al.

APPLIED ARTIFICIAL INTELLIGENCE (2020)

Review Multidisciplinary Sciences

A Systematic Literature Review on Outlier Detection in Wireless Sensor Networks

Mahmood Safaei et al.

SYMMETRY-BASEL (2020)

Article Computer Science, Theory & Methods

Outlier Detection: Methods, Models, and Classification

Azzedine Boukerche et al.

ACM COMPUTING SURVEYS (2020)

Article Endocrinology & Metabolism

Missing data: the impact of what is not there

Rolf H. H. Groenwold et al.

EUROPEAN JOURNAL OF ENDOCRINOLOGY (2020)

Article Computer Science, Information Systems

Optimal Policy-Making for Municipal Waste Management Based on Predictive Model Optimization

Shabir Ahmad et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

LSTM-Based Anomaly Detection for Non-Linear Dynamical System

Yue Tan et al.

IEEE ACCESS (2020)

Article Multidisciplinary Sciences

Analysis of Support Vector Machine-based Intrusion Detection Techniques

Bhoopesh Singh Bhati et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2020)

Article Computer Science, Information Systems

BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset

Tongtong Su et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

High-dimensional multimedia classification using deep CNN and extended residual units

Pourya Shamsolmoali et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Green & Sustainable Science & Technology

Design and Implementation of Thermal Comfort System based on Tasks Allocation Mechanism in Smart Homes

Imran et al.

SUSTAINABILITY (2019)

Article Computer Science, Information Systems

Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach

Adel Binbusayyis et al.

IEEE ACCESS (2019)

Proceedings Paper Automation & Control Systems

Non-linear system modeling using LSTM neural networks

Jesus Gonzalez et al.

IFAC PAPERSONLINE (2018)

Article Computer Science, Information Systems

Identification of malicious activities in industrial internet of things based on deep learning models

Muna AL-Hawawreh et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

A multiclass cascade of artificial neural network for network intrusion detection

Mirza M. Baig et al.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2017)

Review Computer Science, Hardware & Architecture

A survey of network anomaly detection techniques

Mohiuddin Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Telecommunications

On Efficiency of Selected Machine Learning Algorithms for Intrusion Detection in Software Defined Networks

Damian Jankowski et al.

INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Survey on Anomaly Detection using Data Mining Techniques

Shikha Agrawal et al.

KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015 (2015)

Article Computer Science, Artificial Intelligence

Efficient classification using parallel and scalable compressed model and its application on intrusion detection

Tieming Chen et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Information Systems

Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests

Kamaldeep Singh et al.

INFORMATION SCIENCES (2014)

Review Computer Science, Hardware & Architecture

Intrusion detection system: A comprehensive review

Hung-Jen Liao et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Information Systems

Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System

Zhen Chen et al.

TSINGHUA SCIENCE AND TECHNOLOGY (2013)

Proceedings Paper Computer Science, Theory & Methods

A Cloud-Pattern based Network Traffic Analysis Platform for Passive Measurement

Hengbo Wang et al.

2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICE COMPUTING (CSC) (2012)

Article Computer Science, Hardware & Architecture

A Survey of Outlier Detection Methods in Network Anomaly Identification

Prasanta Gogoi et al.

COMPUTER JOURNAL (2011)

Article Computer Science, Hardware & Architecture

Anomaly detection in wireless sensor networks: A survey

Miao Xie et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)

Article Computer Science, Hardware & Architecture

An overview of anomaly detection techniques: Existing solutions and latest technological trends

Animesh Patcha et al.

COMPUTER NETWORKS (2007)

Article Business

A new taxonomy for comparing intrusion detection systems

C. J. Tucker et al.

INTERNET RESEARCH (2007)

Article Engineering, Electrical & Electronic

Non-linear coupled CNN models for multiscale image analysis

F Corinto et al.

INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS (2006)

Article Computer Science, Artificial Intelligence

A survey of outlier detection methodologies

VJ Hodge et al.

ARTIFICIAL INTELLIGENCE REVIEW (2004)

Article Computer Science, Artificial Intelligence

Data dimensionality estimation methods: a survey

F Camastra

PATTERN RECOGNITION (2003)

Review Engineering, Electrical & Electronic

Novelty detection: a review - part 2: neural network based approaches

M Markou et al.

SIGNAL PROCESSING (2003)