4.6 Article

Intrusion detection in networks using cuckoo search optimization

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset

Ziadoon Kamil Maseer et al.

Summary: This study comprehensively reviews previous studies related to AIDS, evaluating the performance of 31 ML-AIDS models with various supervised and unsupervised ML algorithms. Among these models, k-NN-AIDS, DT-AIDS, and NB-AIDS demonstrate superior capabilities in detecting web attacks compared to other models.

IEEE ACCESS (2021)

Article Computer Science, Artificial Intelligence

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

Arwa Aldweesh et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Computer Science, Artificial Intelligence

Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm

Taief Alaa Alamiedy et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Anomaly-Based Intrusion Detection System Using Support Vector Machine

S. Krishnaveni et al.

ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS (2020)

Article Computer Science, Hardware & Architecture

Internet of Things: A survey on machine learning-based intrusion detection approaches

Kelton A. P. da Costa et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Artificial Intelligence

Towards reliable and trustful personal health record systems: a case of cloud-dew architecture based provenance framework

Fakhri Alam Khan et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Artificial Intelligence

An alternative approach to neural network training based on hybrid bio meta-heuristic algorithm

Abdullah Khan et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Theory & Methods

Aggregated provenance and its implications in clouds

Muhammad Imran et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization

Mohammed Hasan Ali et al.

IEEE ACCESS (2018)

Article Computer Science, Theory & Methods

Intrusion detection model using machine learning algorithm on Big Data environment

Suad Mohammed Othman et al.

JOURNAL OF BIG DATA (2018)

Article Computer Science, Artificial Intelligence

An effective intrusion detection framework based on SVM with feature augmentation

Huiwen Wang et al.

KNOWLEDGE-BASED SYSTEMS (2017)

Review Computer Science, Information Systems

False alarm minimization techniques in signature-based intrusion detection systems: A survey

Neminath Hubballi et al.

COMPUTER COMMUNICATIONS (2014)

Article Computer Science, Interdisciplinary Applications

Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems

Amir Hossein Gandomi et al.

ENGINEERING WITH COMPUTERS (2013)

Article Computer Science, Artificial Intelligence

An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks

Shun-Sheng Wang et al.

EXPERT SYSTEMS WITH APPLICATIONS (2011)

Article Computer Science, Information Systems

Anomaly-based network intrusion detection: Techniques, systems and challenges

P. Garcia-Teodoro et al.

COMPUTERS & SECURITY (2009)