相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset
Ziadoon Kamil Maseer et al.
IEEE ACCESS (2021)
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
Arwa Aldweesh et al.
KNOWLEDGE-BASED SYSTEMS (2020)
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm
Taief Alaa Alamiedy et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)
Anomaly-Based Intrusion Detection System Using Support Vector Machine
S. Krishnaveni et al.
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS (2020)
Internet of Things: A survey on machine learning-based intrusion detection approaches
Kelton A. P. da Costa et al.
COMPUTER NETWORKS (2019)
Towards reliable and trustful personal health record systems: a case of cloud-dew architecture based provenance framework
Fakhri Alam Khan et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
An alternative approach to neural network training based on hybrid bio meta-heuristic algorithm
Abdullah Khan et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
A Distributed Network Intrusion Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc Network
Ying Gao et al.
IEEE ACCESS (2019)
Aggregated provenance and its implications in clouds
Muhammad Imran et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization
Mohammed Hasan Ali et al.
IEEE ACCESS (2018)
Intrusion detection model using machine learning algorithm on Big Data environment
Suad Mohammed Othman et al.
JOURNAL OF BIG DATA (2018)
An effective intrusion detection framework based on SVM with feature augmentation
Huiwen Wang et al.
KNOWLEDGE-BASED SYSTEMS (2017)
False alarm minimization techniques in signature-based intrusion detection systems: A survey
Neminath Hubballi et al.
COMPUTER COMMUNICATIONS (2014)
Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems
Amir Hossein Gandomi et al.
ENGINEERING WITH COMPUTERS (2013)
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
Shun-Sheng Wang et al.
EXPERT SYSTEMS WITH APPLICATIONS (2011)
Anomaly-based network intrusion detection: Techniques, systems and challenges
P. Garcia-Teodoro et al.
COMPUTERS & SECURITY (2009)