"Category-Based Intrusion Detection Using PCA"
written by Gholam Reza Zargar, Tania Baghaie,
published by Journal of Information Security, Vol.3 No.4, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Detecting Anomalous Network Traffic in IoT Networks
[2] Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection
[3] Data Pre-Processing and Classification for Traffic Anomaly Intrusion Detection Using NSLKDD Dataset
Cybernetics and Information Technologies, 2018
[4] A Proposed Machine Learning based Scheme for Intrusion Detection
[5] Intrusion Detection System Using Data Mining
International Research Journal of Engineering and Technology, 2018
[6] A PCA-based method for IoT network traffic anomaly detection
[7] Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers
Wireless Personal Communications, 2018
[8] Intrusion detection in RFID system using computational intelligence approach for underground mines
International Journal of Communication Systems, 2018
[9] Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic.
[10] Addressing Challenges in Big Data Intrusion Detection System using Machine Learning Techniques
[11] Research on Translation and Rotation in Handwritten Digits Recognition
[12] Improving intrusion detection using a novel normalization method along with the use of harmony search algorithm for feature selection
[13] Study of stochastic and machine learning techniques for anomalybased web attack detection
Thesis, 2015
[14] Network intrusion detection system using J48 Decision Tree
Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on, 2015
[15] Detection and Containment the Attack that Leads to a Denial of Service Attack
Journal of Algorithms, Computer Network, and Security, 2015
[16] Study of stochastic and machine learning tecniques for anomaly-based Web atack detection
[17] Feature Based Unsupervised Intrusion Detection
International Journal of Computer and Information Engineering, 2014
[18] L-002 主成分分析を用いた分類器による SQL インジェクション攻撃の自動検出法 (L 分野: ネットワーク?セキュリティ, 一般論文)
情報科学技術フォーラム講演論文集, 2013
[19] 基于流的大规模网络安全态势感知关键技术研究
[20] L-002 主成分分析を用いた分類器による SQL インジェクション攻撃の自動検出法 (L 分野: ネットワーク・セキュリティ, 一般論文)
[21] Intrusion Detection System Using Data Mining Technique: Support Vector Machine
International Journal of Emerging Technology and Advanced Engineering, 2013
[22] Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
International Organization of Scientific Research Journal of Computer Engineering (IOSR-JCE), 2013
[23] Network backbone anomaly detection using double random forests based on non-extensive entropy feature extraction
Natural Computation (ICNC), 2013 Ninth International Conference on. IEEE, 2013
[24] IDS in Telecommunication Network Using PCA
arXiv preprint arXiv:1308.2779, 2013
[25] 基于改进非广延熵特征提取的双随机森林实时入侵检测方法
计算机科学, 2013
[26] 主成分分析を用いた分類器による SQL インジェクション攻撃の自動検出法
園田道夫, 松田健, 小泉大城, and 趙晋輝, 2013
[27] Improving performance of support vector machine for intrusion detection using discretization