[1]
|
Hybrid Cloud Data Protection Using Machine Learning Approach
|
|
… Techniques in Data …,
2021 |
|
|
[2]
|
Building an Effective Intrusion Detection System using combined Signature and Anomaly Detection Techniques
|
|
International Journal of Innovative Technology and Exploring Engineering,
2019 |
|
|
[3]
|
Towards Efficient Intrusion Detection using Hybrid Data Mining Techniques
|
|
2019 |
|
|
[4]
|
Sentiment analysis in data of twitter using machine learning algorithms
|
|
2019 |
|
|
[5]
|
Decision Tree and Genetic Algorithm Based Intrusion Detection System
|
|
Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017),
2019 |
|
|
[6]
|
Wise intrusion detection system using fuzzy rough set-based feature extraction and classification algorithms
|
|
2019 |
|
|
[7]
|
Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs
|
|
2019 |
|
|
[8]
|
Evolutionary Decision Tree-Based Intrusion Detection System
|
|
2019 |
|
|
[9]
|
Intrusion Detection System using Fuzzy Rough Set Feature Selection and Modified KNN Classifier
|
|
2019 |
|
|
[10]
|
Network anomaly detection based on logistic regression of nonlinear chaotic invariants
|
|
2019 |
|
|
[11]
|
Building an Effective Intrusion Detection System using Genetic Algorithm based Feature Selection
|
|
2018 |
|
|
[12]
|
Developing an intrusion finding model using a search based feature selection algorithm
|
|
International Journal of Innovative Research & Studies,
2018 |
|
|
[13]
|
Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review
|
|
2018 |
|
|
[14]
|
A machine learning application for reducing the security risks in hybrid cloud networks
|
|
Multimedia Tools and Applications,
2018 |
|
|
[15]
|
Network Traffic Classification Using Multiclass Classifier
|
|
Advances in Computing and Data Sciences,
2018 |
|
|
[16]
|
Construction of Recognition Methodology using Genetic Algorithm
|
|
2017 |
|
|
[17]
|
IMPLEMENTING AN INTRUSION DETECTION METHOD USING A FILTER BASED FEATURE SELECTION ALGORITHM
|
|
International Journal for Innovative Engineering and Management Research,
2017 |
|
|
[18]
|
A C4. 5 algorithm for english emotional classification
|
|
Evolving Systems,
2017 |
|
|
[19]
|
PRODUCTIVITY INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
|
|
2017 |
|
|
[20]
|
A short-term marginal price forecasting model based on ensemble learning
|
|
2017 |
|
|
[21]
|
Anomaly based Malicious Traic Identification using Kernel Extreme Machine Learning (KELM) Classifier and Kernel Principal Component Analysis (KPCA)
|
|
2016 |
|
|
[22]
|
Artifical immune system using Genetic Algorithm and decision tree
|
|
2016 |
|
|
[23]
|
Never Ignore the Significance of Different Anomalies: A Cost-Sensitive Algorithm Based on Loss Function for Anomaly Detection
|
|
2015 |
|
|
[24]
|
A Novel Cloud Intrusion Detection System Using Feature Selection and Classification
|
|
International Journal of Intelligent Information Technologies (IJIIT),
2015 |
|
|
[25]
|
Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System
|
|
International Journal of Computer Network and Information Security (IJCNIS),
2015 |
|
|
[26]
|
Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCA
|
|
Security in Computing and Communications,
2015 |
|
|
[27]
|
INTELLIGENT NETWORK-MISUSE-DETECTION-SYSTEM USING NEUROTREE CLASSIFIER
|
|
Neural Network World,
2015 |
|
|
[28]
|
RBDT: The Cascading of Machine Learning Classifiers for Anomaly Detection with Case Study of Two Datasets
|
|
Advances in Intelligent Informatics,
2015 |
|
|
[29]
|
Application of Intelligent Systems in Network Security: Intrusion Detection Systems and Firewalls
|
|
M Culhane,
2014 |
|
|
[30]
|
Intelligent access control and intrusion detection techniques For web database security
|
|
NULL
2014 |
|
|
[31]
|
Data mining approach for hybrid intrusion detection system
|
|
NULL
2014 |
|
|
[32]
|
Applying non-negative matrix factorization methods to discover user; s resource access patterns for computer security tasks
|
|
Hybrid Intelligent Systems (HIS), 2014 14th International Conference on,
2014 |
|
|
[33]
|
Anomaly detection using machine learning with a case study
|
|
Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on,
2014 |
|
|
[34]
|
Enhancing the precision of phishing classification accuracy using reduced feature set and boosting algorithm
|
|
Advanced Computing (ICoAC), 2014 Sixth International Conference on,
2014 |
|
|
[35]
|
Intrusion Detection-A Comparative Analysis using Classification Algorithms
|
|
Networking and Communication Engineering,
2013 |
|
|
[36]
|
An Intelligent CRF Based Feature Selection for Effective Intrusion Detection
|
|
2013 |
|
|
[37]
|
An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier
|
|
Advanced Computing (ICoAC), 2013 Fifth International Conference on,
2013 |
|
|
[38]
|
Experiments on detection of Denial of Service attacks using REPTree
|
|
Green Computing, Communication and Conservation of Energy (ICGCE), 2013 International Conference on. IEEE, 2013.,
2013 |
|
|
[39]
|
Intelligent algorithms for effective network intrusion detection
|
|
NULL
2013 |
|
|
[40]
|
Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS)
|
|
International Journal of Computer Applications,
2013 |
|
|
[41]
|
Decision tree based light weight intrusion detection using a wrapper approach
|
|
Expert Systems with applications,
2012 |
|
|
[42]
|
Evolving optimised decision rules for intrusion detection using particle swarm paradigm
|
|
International Journal of Systems Science,
2012 |
|
|
[43]
|
Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems
|
|
arXiv preprint arXiv:1210.7650,
2012 |
|
|
[44]
|
Identifying Intrusion Patterns using a Decision Tree.
|
|
International Journal of Computer Applications? ,
2012 |
|
|
[45]
|
Identifying Intrusion Patterns using a Decision Tree
|
|
International Journal of Computer Applications,
2012 |
|
|
[46]
|
Analisis Dan Implementasi Random Forest dan Classification dan Regression Tree (CART) untuk Klasifikasi pada Misuse Intrusion Detection System
|
|
2011 |
|
|
[47]
|
Designing a Hybrid Classifier for Network Intrusion Detection System
|
|
Thesis,
2011 |
|
|
[48]
|
Hybrid Multi-level Intrusion Detection System
|
|
International J. Computer Science and Information Security? ,
2011 |
|
|
[49]
|
Implementation of Intelligent Techniques for Intrusion Detection Systems
|
|
2011 |
|
|
[50]
|
INTRUSION DETECTION SYSTEM USING CONDITIONAL RANDOM FIELD ALGORITHM
|
|
BV RAMUDU, M INAYATHULLA, MP RAO
|
|
|