Inductive intrusion detection in flow-based network data using one-class support vector machines
Despite extensive research effort, ordinary anomaly detection systems still suffer from
serious drawbacks such as high false alarm rates due to the enormous variety of network …
serious drawbacks such as high false alarm rates due to the enormous variety of network …
A t-SNE based non linear dimension reduction for network intrusion detection
With the increased dependence on the internet for day to day activities, the need to keep the
networks secure has become more vital. The quest of securing the computer systems and …
networks secure has become more vital. The quest of securing the computer systems and …
SMART: A tool for analyzing and reconciling schema matching networks
Schema matching supports data integration by establishing correspondences between the
attributes of independently designed database schemas. In recent years, various tools for …
attributes of independently designed database schemas. In recent years, various tools for …
Active learning with neural networks for intrusion detection
This paper presents a neural-network-based active learning procedure for computer network
intrusion detection. Applying data mining and machine learning techniques to network …
intrusion detection. Applying data mining and machine learning techniques to network …
Intelligent intrusion detection system using temporal analysis and type-2 fuzzy neural classification
Cyber attack detection is an important and challenging area of research in the field of
information technology. In such a scenario, intruders introduce new mechanisms by …
information technology. In such a scenario, intruders introduce new mechanisms by …
Network intrusion detection, literature review and some techniques comparision
M Nassar, NA El-Bahnasawy… - 2019 15th …, 2019 - ieeexplore.ieee.org
The massive usage of network-based communication technology to satisfy the user's
requirements opens the way for enormous network attacks to be launched. An intrusion …
requirements opens the way for enormous network attacks to be launched. An intrusion …
Statistical based waveform classification for cloud intrusion detection
Y Liu, KK Tseng, JS Pan - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
In recent years, many approaches have been proposed for intrusion detection. In this paper,
we propose a cloud intrusion detection with a new statistical waveform based classification …
we propose a cloud intrusion detection with a new statistical waveform based classification …
Intrusion detection system in a fleet of drones
R Zhang - 2022 - enac.hal.science
In recent years, the development of the Unmanned Aerial System (UAS) involving swarms of
unmanned aerial vehicles (UAVs) has experienced unprecedented progress. However …
unmanned aerial vehicles (UAVs) has experienced unprecedented progress. However …
An Auto-Reclosing-Based Intrusion Detection Technique for Enterprise Networks
NK Ampah, CM Akujuobi - Handbook of Research on Emerging …, 2015 - igi-global.com
Designing, planning, and managing telecommunication, industrial control, and enterprise
networks with special emphasis on effectiveness, efficiency, and reliability without …
networks with special emphasis on effectiveness, efficiency, and reliability without …
Signal waveform detection with statistical automaton for internet and web service streaming
KK Tseng, Y Ji, Y Liu, NL Huang… - The Scientific World …, 2014 - Wiley Online Library
In recent years, many approaches have been suggested for Internet and web streaming
detection. In this paper, we propose an approach to signal waveform detection for Internet …
detection. In this paper, we propose an approach to signal waveform detection for Internet …