Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets"
written by Bhavesh Borisaniya, Dhiren Patel,
published by Journal of Information Security, Vol.6 No.3, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding
Computers & Security, 2023
[2] Machine Learning Methods leveraging ADFA-LD Dataset for Anomaly Detection in Linux Host Systems
2022 2nd International …, 2022
[3] Interpretability and performance of deep neural network based anomaly detection in cyber security and telecommunications
2022
[4] A Framework for Analysis of Network Traffic Using Predictive Algorithm
… Conference on Computing …, 2022
[5] Computer network intrusion detection using cascade back propagation neural network
2022
[6] Comparison of System Call Sequence Embedding Approaches for Anomaly Detection
Journal of Convergence for Information …, 2022
[7] Intelligent Mechanisms for Monitoring and Intrusion Detection in IoT Devices
2022
[8] Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security
2021
[9] НАБОРЫ ДАННЫХ В ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ ДЛЯ АЛГОРИТМОВ МАШИННОГО ОБУЧЕНИЯ
2021
[10] An Intrusion Detection System on Fog Architecture
… Conference on Mobile Ad Hoc and …, 2021
[11] Intrusion Detection Based on Sequential Information Preserving Log Embedding Methods and Anomaly Detection Algorithms
2021
[12] GAN based Augmentation for Improving Anomaly Detection Accuracy in Host-based Intrusion Detection Systems
International Journal of Engineering Research and Technology, 2020
[13] A new perspective towards the development of robust data-driven intrusion detection for industrial control systems
2020
[14] Comprehensive Review of Cybercrime Detection Techniques
2020
[15] procmonML: Generating evasion resilient host-based behavioral analytics from tree ensembles
2020
[16] A TfidfVectorizer and Singular Value Decomposition based host intrusion detection system framework for detecting anomalous system processes
2020
[17] A Novel Deep Intrusion Detection Model Based On a Convolutional Neural Network.
2019
[18] A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
2019
[19] Data security analysis based on Blockchain Recurrence Qualitative Analysis (BRQA)
2019
[20] Deep Learning Approach for Intelligent Intrusion Detection System
2019
[21] SON KULLANICILAR İÇİN ANOMALİ SALDIRI TESPİT SİSTEMLERİ
2019
[22] EVALUATION OF ANOMALY DETECTION APPROACHES USING SYSTEM CALL TRACES ON EMBEDDED LINUX SYSTEMS AND COMPARISON WITH …
2018
[23] COMBINATION OF MULTI-CHANNEL CNN AND BiLSTM FOR HOST-BASED INTRUSION DETECTION
2018
[24] EagleEye: A Novel Visual Anomaly Detection Method
2018
[25] Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms
Intelligent Data Analysis, 2018
[26] Sequence Covering for Efficient Host-Based Intrusion Detection
2017
[27] Machine Learning for Host-based Misuse and Anomaly Detection in UNIX Environment
Dissertation, University of Toledo, 2017
[28] Ensemble classifier for misuse detection using N-gram feature vectors through operating system call traces
International Journal of Hybrid Intelligent Systems, 2017
[29] Host based intrusion detection system using frequency analysis of n-gram terms
2017
[30] EVALUATING HOST-BASED INTRUSION DETECTION ON THE ADFA-WD AND ADFA-WD: SAA DATASETS
2017
[31] Creation of a Dataset Modeling the System Calls of Spectrum Sensors Affected by Malware
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top