The Use of Artificial‐Intelligence‐Based Ensembles for Intrusion Detection: A Review

G Kumar, K Kumar - Applied Computational Intelligence and …, 2012 - Wiley Online Library
In supervised learning‐based classification, ensembles have been successfully employed to
different application domains. In the literature, many researchers have proposed different …

Machine learning with feature selection using principal component analysis for malware detection: a case study

J Zhang - arxiv preprint arxiv:1902.03639, 2019 - arxiv.org
Cyber security threats have been growing significantly in both volume and sophistication
over the past decade. This poses great challenges to malware detection without …

Feature Selection in the Corrected KDD-dataset

S Zargari, D Voorhis - … on Emerging Intelligent Data and Web …, 2012 - ieeexplore.ieee.org
Automation in anomaly detection, which deals with detecting of unknown attacks in the
network traffic, has been the focus of research by using data mining techniques in recent …

Survey: Intrusion detection systems in encrypted traffic

T Kovanen, G David, T Hämäläinen - … of Things, Smart Spaces, and Next …, 2016 - Springer
Intrusion detection system, IDS, traditionally inspects the payload information of packets.
This approach is not valid in encrypted traffic as the payload information is not available …

Cybersecurity for Industry 4.0 and advanced manufacturing environments with ensemble intelligence

L Thames, D Schaefer - Cybersecurity for Industry 4.0: Analysis for Design …, 2017 - Springer
Traditional cybersecurity architectures incorporate security mechanisms that provide
services such as confidentiality, authenticity, integrity, access control, and non-repudiation …

Hadoop based real-time intrusion detection for high-speed networks

MM Rathore, A Paul, A Ahmad, S Rho… - 2016 IEEE global …, 2016 - ieeexplore.ieee.org
The rate of data generation is enormously growing due to the number of internet users and
its speed. This increases the possibility of intrusions causing serious financial damage …

Variance analysis of networks traffic for intrusion detection in smart grids

A Kuznetsov, A Kiian, O Smirnov… - 2019 IEEE 6th …, 2019 - ieeexplore.ieee.org
We consider the systems of detection and prevention of intrusions in modern
telecommunication systems and networks. Methods of monitoring events, consisting of …

Posture estimation using structure and motion models

Y Iwai, K Ogaki, M Yachida - Proceedings of the Seventh IEEE …, 1999 - ieeexplore.ieee.org
Sensing of human motion is very important for human-computer interactive applications
such as virtual reality, gesture recognition, and communication. A vision system is suitable …

Real-time detection of advanced persistent threats using information flow tracking and hidden Markov models

G Brogi - 2018 - theses.hal.science
In this thesis, we present the risks posed by Advanced Persitent Threats (APTs) and propose
a two-step approach for recognising when detected attacks are part of one. This is part of the …

Soft computing‐based intrusion detection system with reduced false positive rate

DG Bhatti, PV Virparia - … and Analysis of Security Protocol for …, 2020 - Wiley Online Library
Summary Intrusion Detection System is one of the important security mechanisms in today's
information era. Two different approaches are used for intrusion detection: signature based …