"An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm"
written by L Prema RAJESWARI, Kannan ARPUTHARAJ,
published by International Journal of Communications, Network and System Sciences, Vol.1 No.4, 2008
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Decision Tree and Genetic Algorithm Based Intrusion Detection System
Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017), 2019
[2] Wise intrusion detection system using fuzzy rough set-based feature extraction and classification algorithms
2019
[3] Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs
2019
[4] Evolutionary Decision Tree-Based Intrusion Detection System
2019
[5] Intrusion Detection System using Fuzzy Rough Set Feature Selection and Modified KNN Classifier
2019
[6] Network anomaly detection based on logistic regression of nonlinear chaotic invariants
2019
[7] Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review
2018
[8] A machine learning application for reducing the security risks in hybrid cloud networks
Multimedia Tools and Applications, 2018
[9] Network Traffic Classification Using Multiclass Classifier
Advances in Computing and Data Sciences, 2018
[10] IMPLEMENTING AN INTRUSION DETECTION METHOD USING A FILTER BASED FEATURE SELECTION ALGORITHM
International Journal for Innovative Engineering and Management Research, 2017
[11] A C4. 5 algorithm for english emotional classification
Evolving Systems, 2017
[12] PRODUCTIVITY INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
2017
[13] A short-term marginal price forecasting model based on ensemble learning
2017
[14] Anomaly based Malicious Traic Identification using Kernel Extreme Machine Learning (KELM) Classifier and Kernel Principal Component Analysis (KPCA)
2016
[15] Artifical immune system using Genetic Algorithm and decision tree
2016
[16] Never Ignore the Significance of Different Anomalies: A Cost-Sensitive Algorithm Based on Loss Function for Anomaly Detection
2015
[17] A Novel Cloud Intrusion Detection System Using Feature Selection and Classification
International Journal of Intelligent Information Technologies (IJIIT), 2015
[18] Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System
International Journal of Computer Network and Information Security (IJCNIS), 2015
[19] Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCA
Security in Computing and Communications, 2015
[20] INTELLIGENT NETWORK-MISUSE-DETECTION-SYSTEM USING NEUROTREE CLASSIFIER
Neural Network World, 2015
[21] RBDT: The Cascading of Machine Learning Classifiers for Anomaly Detection with Case Study of Two Datasets
Advances in Intelligent Informatics, 2015
[22] Application of Intelligent Systems in Network Security: Intrusion Detection Systems and Firewalls
M Culhane, 2014
[23] Intelligent access control and intrusion detection techniques For web database security
2014
[24] Data mining approach for hybrid intrusion detection system
2014
[25] Applying non-negative matrix factorization methods to discover user; s resource access patterns for computer security tasks
Hybrid Intelligent Systems (HIS), 2014 14th International Conference on, 2014
[26] Anomaly detection using machine learning with a case study
Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on, 2014
[27] Enhancing the precision of phishing classification accuracy using reduced feature set and boosting algorithm
Advanced Computing (ICoAC), 2014 Sixth International Conference on, 2014
[28] Intrusion Detection-A Comparative Analysis using Classification Algorithms
Networking and Communication Engineering, 2013
[29] An Intelligent CRF Based Feature Selection for Effective Intrusion Detection
2013
[30] An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier
Advanced Computing (ICoAC), 2013 Fifth International Conference on, 2013
[31] Experiments on detection of Denial of Service attacks using REPTree
Green Computing, Communication and Conservation of Energy (ICGCE), 2013 International Conference on. IEEE, 2013., 2013
[32] Intelligent algorithms for effective network intrusion detection
2013
[33] Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS)
International Journal of Computer Applications, 2013
[34] Decision tree based light weight intrusion detection using a wrapper approach
Expert Systems with applications, 2012
[35] Evolving optimised decision rules for intrusion detection using particle swarm paradigm
International Journal of Systems Science, 2012
[36] Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems
arXiv preprint arXiv:1210.7650, 2012
[37] Identifying Intrusion Patterns using a Decision Tree.
International Journal of Computer Applications?, 2012
[38] Identifying Intrusion Patterns using a Decision Tree
International Journal of Computer Applications, 2012
[39] Analisis Dan Implementasi Random Forest dan Classification dan Regression Tree (CART) untuk Klasifikasi pada Misuse Intrusion Detection System
2011
[40] Designing a Hybrid Classifier for Network Intrusion Detection System
Thesis, 2011
[41] Hybrid Multi-level Intrusion Detection System
International J. Computer Science and Information Security?, 2011
[42] Implementation of Intelligent Techniques for Intrusion Detection Systems
2011