Related references
Note: Only part of the references are listed.Comparative Analysis of ML Classifiers for Network Intrusion Detection
Ahmed M. Mahfouz et al.
FOURTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 2 (2020)
Network Intrusion Detection System Using Random Forest and Decision Tree Machine Learning Techniques
T. Tulasi Bhavani et al.
FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE (2020)
FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks
Yizhen Jia et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
RTVD: A Real-Time Volumetric Detection Scheme for DDoS in the Internet of Things
Jiabin Li et al.
IEEE ACCESS (2020)
Long Short-Term Memory and Fuzzy Logic for Anomaly Detection and Mitigation in Software-Defined Network Environment
Matheus P. Novaes et al.
IEEE ACCESS (2020)
A survey of network-based intrusion detection data sets
Markus Ring et al.
COMPUTERS & SECURITY (2019)
Wireless Sensor Networks Intrusion Detection Based on SMOTE and the Random Forest Algorithm
Xiaopeng Tan et al.
SENSORS (2019)
Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead
Cynthia Rudin
NATURE MACHINE INTELLIGENCE (2019)
Overcoming the Lack of Labeled Data: Training Intrusion Detection Models using Transfer Learning
Ankush Singla et al.
2019 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2019) (2019)
Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset
Arif Yulianto et al.
2ND INTERNATIONAL CONFERENCE ON DATA AND INFORMATION SCIENCE (2019)
Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic
Razan Abdulhammed et al.
IEEE SENSORS LETTERS (2019)
Inverse statistical physics of protein sequences: a key issues review
Simona Cocco et al.
REPORTS ON PROGRESS IN PHYSICS (2018)
Detection of slow port scans in flow-based network traffic
Markus Ring et al.
PLOS ONE (2018)
Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning
Abhishek Verma et al.
6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (2018)
Prequential AUC: properties of the area under the ROC curve for data streams with concept drift
Dariusz Brzezinski et al.
KNOWLEDGE AND INFORMATION SYSTEMS (2017)
Flow-based intrusion detection: Techniques and challenges
Muhammad Fahad Umer et al.
COMPUTERS & SECURITY (2017)
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Anna L. Buczak et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks
Ahmed AlEroud et al.
2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY) (2012)
Direct-coupling analysis of residue coevolution captures native contacts across many protein families
Faruck Morcos et al.
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2011)
An Overview of IP Flow-Based Intrusion Detection
Anna Sperotto et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)
Random forest: A classification and regression tool for compound classification and QSAR modeling
V Svetnik et al.
JOURNAL OF CHEMICAL INFORMATION AND COMPUTER SCIENCES (2003)