4.4 Article

Diverse Analysis of Data Mining and Machine Learning Algorithms to Secure Computer Network

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN

Soodeh Hosseini et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Artificial Intelligence

A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer

Hadeel Alazzam et al.

EXPERT SYSTEMS WITH APPLICATIONS (2020)

Proceedings Paper Computer Science, Information Systems

Decision Tree with Sensitive Pruning in Network-based Intrusion Detection System

Yee Jian Chew et al.

COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST 2019) (2020)

Article Computer Science, Artificial Intelligence

An analysis of A feature reduced intrusion detection system using ANN classifier by Akashdeep et al. expert systems with applications (2017)

Trupti Chandak et al.

EXPERT SYSTEMS WITH APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept

Gautam M. Borkar et al.

SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS (2019)

Article Computer Science, Hardware & Architecture

Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection

Fadi Salo et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Information Systems

Cyber intrusion detection by combined feature selection algorithm

Sara Mohammadi et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

Feature clustering dimensionality reduction based on affinity propagation

Yahong Zhang et al.

INTELLIGENT DATA ANALYSIS (2018)

Article Computer Science, Information Systems

Developing an Intrusion Detection Framework for High-Speed Big Data Networks: A Comprehensive Approach

Kamran Siddique et al.

KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Network Intrusion Detection Systems Using Neural Networks

Sireesha Rodda

INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017 (2018)

Article Computer Science, Artificial Intelligence

A feature reduced intrusion detection system using ANN classifier

Akashdeep et al.

EXPERT SYSTEMS WITH APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system

Wathiq Laftah Al-Yaseen et al.

EXPERT SYSTEMS WITH APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

An improved NSGA-III algorithm for feature selection used in intrusion detection

Yingying Zhu et al.

KNOWLEDGE-BASED SYSTEMS (2017)

Article Computer Science, Artificial Intelligence

A hybrid method consisting of GA and SVM for intrusion detection system

B. M. Aslahi-Shahri et al.

NEURAL COMPUTING & APPLICATIONS (2016)

Article Computer Science, Hardware & Architecture

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Mohammed A. Ambusaidi et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Proceedings Paper Computer Science, Theory & Methods

Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad Split

Shubha Puthran et al.

SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016 (2016)

Article Computer Science, Artificial Intelligence

A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems

Adel Sabry Eesa et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Artificial Intelligence

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

Wei-Chao Lin et al.

KNOWLEDGE-BASED SYSTEMS (2015)

Article Computer Science, Artificial Intelligence

A novel hybrid feature selection method based on rough set and improved harmony search

H. Hannah Inbarani et al.

NEURAL COMPUTING & APPLICATIONS (2015)

Article Computer Science, Artificial Intelligence

A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

Gisung Kim et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Artificial Intelligence

MIFS-ND: A mutual information-based feature selection method

N. Hoque et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Information Systems

On the use of MapReduce for imbalanced big data using Random Forest

Sara del Rio et al.

INFORMATION SCIENCES (2014)

Proceedings Paper Computer Science, Information Systems

A novel feature selection approach for intrusion detection data classification

Mohammed A. Ambusaidi et al.

2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM) (2014)

Article Engineering, Multidisciplinary

A hybrid network intrusion detection framework based on random forests and weighted k-means

Reda M. Elbasiony et al.

AIN SHAMS ENGINEERING JOURNAL (2013)

Article Computer Science, Artificial Intelligence

An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection

Shih-Wei Lin et al.

APPLIED SOFT COMPUTING (2012)

Article Computer Science, Artificial Intelligence

A network intrusion detection system based on a Hidden Naive Bayes multiclass classifier

Levent Koc et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Article Computer Science, Artificial Intelligence

Decision tree based light weight intrusion detection using a wrapper approach

Siva S. Sivatha Sindhu et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Article Computer Science, Artificial Intelligence

An efficient intrusion detection system based on support vector machines and gradually feature removal method

Yinhui Li et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Proceedings Paper Computer Science, Information Systems

Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm

Amuthan Prabakar Muniyandi et al.

INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND SYSTEM DESIGN 2011 (2012)

Article Computer Science, Hardware & Architecture

Mutual information-based feature selection for intrusion detection systems

Fatemeh Amiri et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Artificial Intelligence

A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering

Gang Wang et al.

EXPERT SYSTEMS WITH APPLICATIONS (2010)

Review Computer Science, Artificial Intelligence

Intrusion detection by machine learning: A review

Chih-Fong Tsai et al.

EXPERT SYSTEMS WITH APPLICATIONS (2009)

Article Computer Science, Information Systems

A Survey of Techniques for Internet Traffic Classification using Machine Learning

Thuy T. T. Nguyen et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)

Article Computer Science, Information Systems

A hybrid artificial immune system and Self Organising Map for network intrusion detection

Simon T. Powers et al.

INFORMATION SCIENCES (2008)

Article Computer Science, Hardware & Architecture

A new intrusion detection system using support vector machines and hierarchical clustering

Latifur Khan et al.

VLDB JOURNAL (2007)

Article Computer Science, Artificial Intelligence

A hierarchical intrusion detection model based on the PCA neural networks

Guisong Liu et al.

NEUROCOMPUTING (2007)

Article Computer Science, Hardware & Architecture

Modeling intrusion detection system using hybrid intelligent systems

Sandhya Peddabachigari et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2007)

Article Computer Science, Artificial Intelligence

An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks

O Depren et al.

EXPERT SYSTEMS WITH APPLICATIONS (2005)

Article Computer Science, Information Systems

Feature deduction and ensemble design of intrusion detection systems

S Chebrolu et al.

COMPUTERS & SECURITY (2005)

Article Computer Science, Artificial Intelligence

Intrusion detection using hierarchical neural networks

CL Zhang et al.

PATTERN RECOGNITION LETTERS (2005)

Article Computer Science, Artificial Intelligence

A genetic clustering method for intrusion detection

YG Liu et al.

PATTERN RECOGNITION (2004)

Article Computer Science, Hardware & Architecture

Improving intrusion detection performance using keyword selection and neural networks

RP Lippmann et al.

COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING (2000)