Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of distance and similarity measures used within network intrusion anomaly detection
DJ Weller-Fahy, BJ Borghetti… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Anomaly detection (AD) use within the network intrusion detection field of research, or
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …
Improving performance of intrusion detection system using ensemble methods and feature selection
The main task of an intrusion detection system (IDS) is to detect anomalous behaviors from
both within and outside the network system, and there have been increasing studies …
both within and outside the network system, and there have been increasing studies …
Unsupervised clustering approach for network anomaly detection
This paper describes the advantages of using the anomaly detection approach over the
misuse detection technique in detecting unknown network intrusions or attacks. It also …
misuse detection technique in detecting unknown network intrusions or attacks. It also …
Application of bagging, boosting and stacking to intrusion detection
This paper investigates the possibility of using ensemble algorithms to improve the
performance of network intrusion detection systems. We use an ensemble of three different …
performance of network intrusion detection systems. We use an ensemble of three different …
Intrusion detection based on ensemble learning for big data classification
The escalating frequency and sophistication of cyber threats pose significant challenges to
traditional intrusion detection methods. Signature-based misuse detection, hybrid detection …
traditional intrusion detection methods. Signature-based misuse detection, hybrid detection …
Intrusion detection model based on ensemble learning for U2R and R2L attacks
Intrusion Detection System (IDS) is a tool for anomaly detection in network that can help to
protect network security. At present, intrusion detection systems have been developed to …
protect network security. At present, intrusion detection systems have been developed to …
Building an ensemble learning based algorithm for improving intrusion detection system
Intrusion detection system (IDS) alerts the network administrators against intrusive attempts.
The anomalies are detected using machine learning techniques such as supervised and …
The anomalies are detected using machine learning techniques such as supervised and …
Exploring discrepancies in findings obtained with the KDD Cup'99 data set
The KDD Cup'99 data set has been widely used to evaluate intrusion detection prototypes,
most based on machine learning techniques, for nearly a decade. The data set served well …
most based on machine learning techniques, for nearly a decade. The data set served well …
A data mining based system for automating creation of cyber threat intelligence
SM Arıkan, S Acar - … on Digital Forensics and Security (ISDFS), 2021 - ieeexplore.ieee.org
In this study, since it is a laborious task to create cyber threat intelligence (CTI), a system that
will facilitate the generating of CTI with data mining techniques is proposed. With the system …
will facilitate the generating of CTI with data mining techniques is proposed. With the system …
Machine learning for network based intrusion detection: an investigation into discrepancies in findings with the KDD cup'99 data set and multi-objective evolution of …
V Engen - 2010 - eprints.bournemouth.ac.uk
For the last decade it has become commonplace to evaluate machine learning techniques
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …