Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Building an efficient intrusion detection system based on feature selection and ensemble classifier
Y Zhou, G Cheng, S Jiang, M Dai - Computer networks, 2020 - Elsevier
Intrusion detection system (IDS) is one of extensively used techniques in a network topology
to safeguard the integrity and availability of sensitive assets in the protected systems …
to safeguard the integrity and availability of sensitive assets in the protected systems …
TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system
Intrusion detection systems (IDSs) play a pivotal role in computer security by discovering
and repealing malicious activities in computer networks. Anomaly-based IDS, in particular …
and repealing malicious activities in computer networks. Anomaly-based IDS, in particular …
A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM
A pattern matching method (signature-based) is widely used in basic network intrusion
detection systems (IDS). A more robust method is to use a machine learning classifier to …
detection systems (IDS). A more robust method is to use a machine learning classifier to …
A deep learning approach for network intrusion detection system
A Network Intrusion Detection System (NIDS) helps system administrators to detect network
security breaches in their organizations. However, many challenges arise while develo** …
security breaches in their organizations. However, many challenges arise while develo** …
A two-stage intrusion detection system with auto-encoder and LSTMs
Abstract 'Curse of dimensionality'and the trade-off between low false alarm rate and high
detection rate are the major concerns while designing an efficient intrusion detection system …
detection rate are the major concerns while designing an efficient intrusion detection system …
Autoencoder-based feature learning for cyber security applications
M Yousefi-Azar, V Varadharajan… - … joint conference on …, 2017 - ieeexplore.ieee.org
This paper presents a novel feature learning model for cyber security tasks. We propose to
use Auto-encoders (AEs), as a generative model, to learn latent representation of different …
use Auto-encoders (AEs), as a generative model, to learn latent representation of different …
Network anomaly detection with stochastically improved autoencoder based models
RC Aygun, AG Yavuz - … conference on cyber security and cloud …, 2017 - ieeexplore.ieee.org
Intrusion detection systems do not perform well when it comes to detecting zero-day attacks,
therefore improving their performance in that regard is an active research topic. In this study …
therefore improving their performance in that regard is an active research topic. In this study …
An effective combining classifier approach using tree algorithms for network intrusion detection
In this paper, we developed a combining classifier model based on tree-based algorithms
for network intrusion detection. The NSL-KDD dataset, a much improved version of the …
for network intrusion detection. The NSL-KDD dataset, a much improved version of the …
Two-tier network anomaly detection model: a machine learning approach
Network anomaly detection is one of the most challenging fields in cyber security. Most of
the proposed techniques have high computation complexity or based on heuristic …
the proposed techniques have high computation complexity or based on heuristic …
An in-depth experimental study of anomaly detection using gradient boosted machine
BA Tama, KH Rhee - Neural Computing and Applications, 2019 - Springer
This paper proposes an improved detection performance of anomaly-based intrusion
detection system (IDS) using gradient boosted machine (GBM). The best parameters of GBM …
detection system (IDS) using gradient boosted machine (GBM). The best parameters of GBM …