4.2 Article

Semi-supervised tri-Adaboost algorithm for network intrusion detection

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System

Haipeng Yao et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

Semi-Supervised Multivariate Statistical Network Monitoring for Learning Security Threats

Jose Camacho et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Fuzziness based semi-supervised learning approach for intrusion detection system

Rana Aamir Raza Ashfaq et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Information Systems

A survey of intrusion detection systems based on ensemble and hybrid classifiers

Abdulla Amin Aburomman et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Anna L. Buczak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Review Computer Science, Hardware & Architecture

User profiling in intrusion detection: A review

Jian Peng et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Review Computer Science, Hardware & Architecture

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

Salman Iqbal et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Information Systems

Selection of Candidate Support Vectors in incremental SVM for network intrusion detection

Roshan Chitrakar et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Interdisciplinary Applications

A Novel Semi-supervised SVM Based on Tri-training for Intrusition Detection

Jimin Li et al.

JOURNAL OF COMPUTERS (2010)

Article Computer Science, Hardware & Architecture

Intrusion detection using an ensemble of intelligent paradigms

S Mukkamala et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2005)