Inductive intrusion detection in flow-based network data using one-class support vector machines

P Winter, E Hermann, M Zeilinger - 2011 4th IFIP international …, 2011 - ieeexplore.ieee.org
Despite extensive research effort, ordinary anomaly detection systems still suffer from
serious drawbacks such as high false alarm rates due to the enormous variety of network …

A t-SNE based non linear dimension reduction for network intrusion detection

Y Hamid, M Sugumaran - International Journal of Information Technology, 2020 - Springer
With the increased dependence on the internet for day to day activities, the need to keep the
networks secure has become more vital. The quest of securing the computer systems and …

SMART: A tool for analyzing and reconciling schema matching networks

QVH Nguyen, TT Nguyen, VT Chau… - 2015 IEEE 31st …, 2015 - ieeexplore.ieee.org
Schema matching supports data integration by establishing correspondences between the
attributes of independently designed database schemas. In recent years, various tools for …

Active learning with neural networks for intrusion detection

N Seliya, TM Khoshgoftaar - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
This paper presents a neural-network-based active learning procedure for computer network
intrusion detection. Applying data mining and machine learning techniques to network …

Intelligent intrusion detection system using temporal analysis and type-2 fuzzy neural classification

KPR Prabha, N Jeyanthi - International Journal of Internet …, 2018 - inderscienceonline.com
Cyber attack detection is an important and challenging area of research in the field of
information technology. In such a scenario, intruders introduce new mechanisms by …

Network intrusion detection, literature review and some techniques comparision

M Nassar, NA El-Bahnasawy… - 2019 15th …, 2019 - ieeexplore.ieee.org
The massive usage of network-based communication technology to satisfy the user's
requirements opens the way for enormous network attacks to be launched. An intrusion …

Statistical based waveform classification for cloud intrusion detection

Y Liu, KK Tseng, JS Pan - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
In recent years, many approaches have been proposed for intrusion detection. In this paper,
we propose a cloud intrusion detection with a new statistical waveform based classification …

Intrusion detection system in a fleet of drones

R Zhang - 2022 - enac.hal.science
In recent years, the development of the Unmanned Aerial System (UAS) involving swarms of
unmanned aerial vehicles (UAVs) has experienced unprecedented progress. However …

An Auto-Reclosing-Based Intrusion Detection Technique for Enterprise Networks

NK Ampah, CM Akujuobi - Handbook of Research on Emerging …, 2015 - igi-global.com
Designing, planning, and managing telecommunication, industrial control, and enterprise
networks with special emphasis on effectiveness, efficiency, and reliability without …

Signal waveform detection with statistical automaton for internet and web service streaming

KK Tseng, Y Ji, Y Liu, NL Huang… - The Scientific World …, 2014 - Wiley Online Library
In recent years, many approaches have been suggested for Internet and web streaming
detection. In this paper, we propose an approach to signal waveform detection for Internet …