• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4598322)   Today's Articles (639)   Subscriber (49354)
For: Aslahi-Shahri BM, Rahmani R, Chizari M, Maralani A, Eslami M, Golkar MJ, Ebrahimi A. A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput Appl 2015. [DOI: 10.1007/s00521-015-1964-2] [Citation(s) in RCA: 64] [Impact Index Per Article: 7.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Number Cited by Other Article(s)
1
Sharma RK, Issac B, Xin Q, Gadekallu TR, Nath K. Plant and Salamander Inspired Network Attack Detection and Data Recovery Model. SENSORS (BASEL, SWITZERLAND) 2023;23:5562. [PMID: 37420729 DOI: 10.3390/s23125562] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/15/2023] [Revised: 04/24/2023] [Accepted: 06/01/2023] [Indexed: 07/09/2023]
2
Alkasassbeh M, Al-Haj Baddar S. Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2022. [DOI: 10.1007/s13369-022-07412-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
3
Hybrid Feature Selection Method for Intrusion Detection Systems Based on an Improved Intelligent Water Drop Algorithm. CYBERNETICS AND INFORMATION TECHNOLOGIES 2022. [DOI: 10.2478/cait-2022-0040] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
4
A novel method for intrusion detection in computer networks by identifying multivariate outliers and ReliefF feature selection. Neural Comput Appl 2022. [DOI: 10.1007/s00521-022-07402-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
5
Fuzzy Local Information and Bhattacharya-Based C-Means Clustering and Optimized Deep Learning in Spark Framework for Intrusion Detection. ELECTRONICS 2022. [DOI: 10.3390/electronics11111675] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]
6
Kumar N, Kumar U. Artificial intelligence for classification and regression tree based feature selection method for network intrusion detection system in various telecommunication technologies. Comput Intell 2022. [DOI: 10.1111/coin.12500] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
7
Wang W, Jian S, Tan Y, Wu Q, Huang C. Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions. Comput Secur 2022. [DOI: 10.1016/j.cose.2021.102537] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
8
Halim Z, Yousaf MN, Waqas M, Sulaiman M, Abbas G, Hussain M, Ahmad I, Hanif M. An effective genetic algorithm-based feature selection method for intrusion detection systems. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102448] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
9
Alazzam H, Sharieh A, Sabri KE. A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer. APPL INTELL 2021. [DOI: 10.1007/s10489-021-02621-x] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
10
A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif Intell Rev 2021. [DOI: 10.1007/s10462-021-10037-9] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/22/2023]
11
Kumar S, Pal AK, Islam SKH, Hammoudeh M. Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Comput Appl 2021. [DOI: 10.1007/s00521-021-06054-y] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
12
Zhou C, Song J, Zhou S, Zhang Z, Xing J. COVID-19 Detection Based on Image Regrouping and Resnet-SVM Using Chest X-Ray Images. IEEE ACCESS : PRACTICAL INNOVATIONS, OPEN SOLUTIONS 2021;9:81902-81912. [PMID: 34812395 PMCID: PMC8545189 DOI: 10.1109/access.2021.3086229] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/19/2021] [Accepted: 05/31/2021] [Indexed: 06/01/2023]
13
Sekhar R, Sasirekha K, Raja PS, Thangavel K. A novel GPU based intrusion detection system using deep autoencoder with Fruitfly optimization. SN APPLIED SCIENCES 2021. [DOI: 10.1007/s42452-021-04579-4] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/08/2023]  Open
14
Diao L, Hu P. Deep learning and multimodal target recognition of complex and ambiguous words in automated English learning system. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2021. [DOI: 10.3233/jifs-189543] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
15
Gu J, Lu S. An effective intrusion detection approach using SVM with naïve Bayes feature embedding. Comput Secur 2021. [DOI: 10.1016/j.cose.2020.102158] [Citation(s) in RCA: 19] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/16/2022]
16
Intrusion Detection System in the Advanced Metering Infrastructure: A Cross-Layer Feature-Fusion CNN-LSTM-Based Approach. SENSORS 2021;21:s21020626. [PMID: 33477451 PMCID: PMC7830526 DOI: 10.3390/s21020626] [Citation(s) in RCA: 23] [Impact Index Per Article: 7.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/02/2020] [Revised: 01/14/2021] [Accepted: 01/14/2021] [Indexed: 11/16/2022]
17
Kejia S, Parvin H, Qasem SN, Tuan BA, Pho KH. A classification model based on svm and fuzzy rough set for network intrusion detection. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020. [DOI: 10.3233/jifs-191621] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
18
Hosseinzadeh M, Rahmani AM, Vo B, Bidaki M, Masdari M, Zangakani M. Improving security using SVM-based anomaly detection: issues and challenges. Soft comput 2020. [DOI: 10.1007/s00500-020-05373-x] [Citation(s) in RCA: 19] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
19
Nasiri JA, Mir AM. An enhanced KNN-based twin support vector machine with stable learning rules. Neural Comput Appl 2020. [DOI: 10.1007/s00521-020-04740-x] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
20
Kushwah GS, Ranga V. Voting extreme learning machine based distributed denial of service attack detection in cloud computing. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102532] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
21
A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms. Symmetry (Basel) 2020. [DOI: 10.3390/sym12061046] [Citation(s) in RCA: 58] [Impact Index Per Article: 14.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
22
Ayo FE, Folorunso SO, Abayomi-Alli AA, Adekunle AO, Awotunde JB. Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection. INFORMATION SECURITY JOURNAL: A GLOBAL PERSPECTIVE 2020. [DOI: 10.1080/19393555.2020.1767240] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
23
A Novel Hybrid IDS Based on Modified NSGAII-ANN and Random Forest. ELECTRONICS 2020. [DOI: 10.3390/electronics9040577] [Citation(s) in RCA: 18] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
24
RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. FUTURE INTERNET 2020. [DOI: 10.3390/fi12030044] [Citation(s) in RCA: 64] [Impact Index Per Article: 16.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
25
Tavolato P, Schölnast H, Tavolato-Wötzl C. Analytical modelling of cyber-physical systems: applying kinetic gas theory to anomaly detection in networks. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2020. [DOI: 10.1007/s11416-020-00349-9] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
26
A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm. Neural Comput Appl 2019. [DOI: 10.1007/s00521-019-04655-2] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
27
Zhang F, Wu TY, Pan JS, Ding G, Li Z. Human motion recognition based on SVM in VR art media interaction environment. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES 2019. [DOI: 10.1186/s13673-019-0203-8] [Citation(s) in RCA: 26] [Impact Index Per Article: 5.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/02/2023]
28
Intrusion detection using deep sparse auto-encoder and self-taught learning. Neural Comput Appl 2019. [DOI: 10.1007/s00521-019-04152-6] [Citation(s) in RCA: 27] [Impact Index Per Article: 5.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
29
A new hybrid approach for intrusion detection using machine learning methods. APPL INTELL 2019. [DOI: 10.1007/s10489-018-01408-x] [Citation(s) in RCA: 63] [Impact Index Per Article: 12.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
30
A novel support vector regression algorithm incorporated with prior knowledge and error compensation for small datasets. Neural Comput Appl 2019. [DOI: 10.1007/s00521-018-03981-1] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
31
A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.01.023] [Citation(s) in RCA: 60] [Impact Index Per Article: 10.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
32
Acharya N, Singh S. An IWD-based feature selection method for intrusion detection system. Soft comput 2017. [DOI: 10.1007/s00500-017-2635-2] [Citation(s) in RCA: 44] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA