• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4749092)   Today's Articles (11789)
For: Hu W, Gao J, Wang Y, Wu O, Maybank S. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection. IEEE Trans Cybern 2014;44:66-82. [PMID: 23757534 DOI: 10.1109/tcyb.2013.2247592] [Citation(s) in RCA: 26] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
Number Cited by Other Article(s)
1
Zou C, Chen R, Wang B, Fei Q, Song H, Zang L. Development of a deep learning radiomics model combining lumbar CT, multi-sequence MRI, and clinical data to predict high-risk cage subsidence after lumbar fusion: a retrospective multicenter study. Biomed Eng Online 2025;24:27. [PMID: 40025592 PMCID: PMC11872306 DOI: 10.1186/s12938-025-01355-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/16/2024] [Accepted: 02/18/2025] [Indexed: 03/04/2025]  Open
2
Hashmi A, Barukab OM, Hamza Osman A. A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm. PLoS One 2024;19:e0302294. [PMID: 38781186 PMCID: PMC11115263 DOI: 10.1371/journal.pone.0302294] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/01/2023] [Accepted: 04/01/2024] [Indexed: 05/25/2024]  Open
3
Al-Saleh A. A balanced communication-avoiding support vector machine decision tree method for smart intrusion detection systems. Sci Rep 2023;13:9083. [PMID: 37277467 DOI: 10.1038/s41598-023-36304-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/07/2022] [Accepted: 05/31/2023] [Indexed: 06/07/2023]  Open
4
Sun EYN, Wu HC, Huang SCH, Kuan YC. A Novel Protocol-Free Bandage-Cover Cryptographer. IEEE TRANSACTIONS ON CYBERNETICS 2022;52:11431-11441. [PMID: 34637392 DOI: 10.1109/tcyb.2021.3117235] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
5
Yang Z, Liu X, Li T, Wu D, Wang J, Zhao Y, Han H. A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102675] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
6
Wu Z, Gao P, Cui L, Chen J. An Incremental Learning Method Based on Dynamic Ensemble RVM for Intrusion Detection. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2022. [DOI: 10.1109/tnsm.2021.3102388] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
7
Markiewicz M, Koperwas J. Evaluation Platform for DDM Algorithms With the Usage of Non-Uniform Data Distribution Strategies. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH 2022. [DOI: 10.4018/ijitsa.290000] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
8
Bhor HN, Kalla M. TRUST‐based features for detecting the intruders in the Internet of Things network using deep learning. Comput Intell 2021. [DOI: 10.1111/coin.12473] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
9
Gavel S, Raghuvanshi AS, Tiwari S. A novel density estimation based intrusion detection technique with Pearson's divergence for Wireless Sensor Networks. ISA TRANSACTIONS 2021;111:180-191. [PMID: 33276967 DOI: 10.1016/j.isatra.2020.11.016] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/16/2019] [Revised: 11/09/2020] [Accepted: 11/22/2020] [Indexed: 06/12/2023]
10
A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies. ENTROPY 2021;23:e23050529. [PMID: 33923125 PMCID: PMC8145138 DOI: 10.3390/e23050529] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/15/2021] [Revised: 04/11/2021] [Accepted: 04/20/2021] [Indexed: 12/03/2022]
11
Liu C, Lore KG, Jiang Z, Sarkar S. Root-cause analysis for time-series anomalies via spatiotemporal graphical modeling in distributed complex systems. Knowl Based Syst 2021. [DOI: 10.1016/j.knosys.2020.106527] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
12
A new perspective towards the development of robust data-driven intrusion detection for industrial control systems. NUCLEAR ENGINEERING AND TECHNOLOGY 2020. [DOI: 10.1016/j.net.2020.05.012] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
13
Molina-Coronado B, Mori U, Mendiburu A, Miguel-Alonso J. Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2020. [DOI: 10.1109/tnsm.2020.3016246] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
14
Hosseinzadeh M, Rahmani AM, Vo B, Bidaki M, Masdari M, Zangakani M. Improving security using SVM-based anomaly detection: issues and challenges. Soft comput 2020. [DOI: 10.1007/s00500-020-05373-x] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
15
Du J, Vong CM. Robust Online Multilabel Learning Under Dynamic Changes in Data Distribution With Labels. IEEE TRANSACTIONS ON CYBERNETICS 2020;50:374-385. [PMID: 31107670 DOI: 10.1109/tcyb.2018.2869476] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
16
Intrusion Detection of UAVs Based on the Deep Belief Network Optimized by PSO. SENSORS 2019;19:s19245529. [PMID: 31847361 PMCID: PMC6960526 DOI: 10.3390/s19245529] [Citation(s) in RCA: 23] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/16/2019] [Revised: 12/09/2019] [Accepted: 12/12/2019] [Indexed: 11/17/2022]
17
Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf Sci (N Y) 2019. [DOI: 10.1016/j.ins.2018.06.072] [Citation(s) in RCA: 15] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
18
Sharifnia E, Boostani R. Instance-Based Cost-Sensitive Boosting. INT J PATTERN RECOGN 2019. [DOI: 10.1142/s0218001420500020] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/14/2022]
19
Mikhail JW, Fossaceca JM, Iammartino R. A Semi-Boosted Nested Model With Sensitivity-Based Weighted Binarization for Multi-Domain Network Intrusion Detection. ACM T INTEL SYST TEC 2019. [DOI: 10.1145/3313778] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/20/2022]
20
Mohammadi S, Amiri F. An Efficient Hybrid Self-Learning Intrusion Detection System Based on Neural Networks. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS 2019. [DOI: 10.1142/s1469026819500019] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
21
Yu H, Webb GI. Adaptive online extreme learning machine by regulating forgetting factor by concept drift map. Neurocomputing 2019. [DOI: 10.1016/j.neucom.2018.11.098] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
22
B S, K M. Firefly algorithm based feature selection for network intrusion detection. Comput Secur 2019. [DOI: 10.1016/j.cose.2018.11.005] [Citation(s) in RCA: 81] [Impact Index Per Article: 13.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
23
Wang W, Velswamy K, Hao K, Chen L, Pedrycz W. A hierarchical memory network-based approach to uncertain streaming data. Knowl Based Syst 2019. [DOI: 10.1016/j.knosys.2018.11.011] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
24
Improved Relevance Vector Machine (IRVM) classifier for Intrusion Detection System. Soft comput 2018. [DOI: 10.1007/s00500-018-3621-z] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
25
Mousavinejad E, Yang F, Han QL, Vlacic L. A Novel Cyber Attack Detection Method in Networked Control Systems. IEEE TRANSACTIONS ON CYBERNETICS 2018;48:3254-3264. [PMID: 29994687 DOI: 10.1109/tcyb.2018.2843358] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
26
Hidden Markov models with random restarts versus boosting for malware detection. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2018. [DOI: 10.1007/s11416-018-0322-1] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
27
Wang CR, Xu RF, Lee SJ, Lee CH. Network intrusion detection using equality constrained-optimization-based extreme learning machines. Knowl Based Syst 2018. [DOI: 10.1016/j.knosys.2018.02.015] [Citation(s) in RCA: 29] [Impact Index Per Article: 4.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
28
Aleroud A, Karabatis G. Contextual information fusion for intrusion detection: a survey and taxonomy. Knowl Inf Syst 2017. [DOI: 10.1007/s10115-017-1027-3] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
29
Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet. SUSTAINABILITY 2017. [DOI: 10.3390/su9020262] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
30
Security Enrichment in Intrusion Detection System Using Classifier Ensemble. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING 2017. [DOI: 10.1155/2017/1794849] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
31
Dynamic classifier selection for one-class classification. Knowl Based Syst 2016. [DOI: 10.1016/j.knosys.2016.05.054] [Citation(s) in RCA: 33] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
32
Al-Jarrah OY, Alhussein O, Yoo PD, Muhaidat S, Taha K, Kim K. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection. IEEE TRANSACTIONS ON CYBERNETICS 2016;46:1796-806. [PMID: 26540724 DOI: 10.1109/tcyb.2015.2490802] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/22/2023]
33
Liu CL, Hsaio WH, Lee CH, Chang TH, Kuo TH. Semi-Supervised Text Classification With Universum Learning. IEEE TRANSACTIONS ON CYBERNETICS 2016;46:462-473. [PMID: 25730839 DOI: 10.1109/tcyb.2015.2403573] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
34
Elsayed S, Sarker R, Essam D. Survey of Uses of Evolutionary Computation Algorithms and Swarm Intelligence for Network Intrusion Detection. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS 2015. [DOI: 10.1142/s146902681550025x] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA