[1]
|
Emerging Trends and Technologies on Intelligent Systems
Lecture Notes in Networks and Systems,
2025
DOI:10.1007/978-981-97-5703-9_27
|
|
|
[2]
|
A Detailed Comparative Study of AI-Based Intrusion Detection System for Smart Cities
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE),
2024
DOI:10.1109/IC3SE62002.2024.10593485
|
|
|
[3]
|
Proceedings of 3rd International Conference on Smart Computing and Cyber Security
Lecture Notes in Networks and Systems,
2024
DOI:10.1007/978-981-97-0573-3_22
|
|
|
[4]
|
Security posture detection using LLM
ANNUAL SYMPOSIUM ON APPLIED AND INNOVATION TECHNOLOGICAL ENVIRONMENT 2023 (ASAITE2023): Smart Technology based on Revolution Industry 4.0 and Society 5.0,
2024
DOI:10.1063/5.0227627
|
|
|
[5]
|
Artificial Intelligence and Its Practical Applications in the Digital Economy
Lecture Notes in Networks and Systems,
2024
DOI:10.1007/978-3-031-71426-9_14
|
|
|
[6]
|
Evaluating the Effectiveness of Deep Learning Models in Network Intrusion Detection
2024 International Conference on Cybernation and Computation (CYBERCOM),
2024
DOI:10.1109/CYBERCOM63683.2024.10803243
|
|
|
[7]
|
Enhanced Quantum-Secure Ensemble Intrusion Detection Techniques for Cloud Based on Deep Learning
Cognitive Computation,
2023
DOI:10.1007/s12559-023-10139-2
|
|
|
[8]
|
Detection of Network Attacks using Machine Learning and Deep Learning Models
Procedia Computer Science,
2023
DOI:10.1016/j.procs.2022.12.401
|
|
|
[9]
|
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree
IEEE Access,
2023
DOI:10.1109/ACCESS.2023.3296444
|
|
|
[10]
|
Enhanced Quantum-Secure Ensemble Intrusion Detection Techniques for Cloud Based on Deep Learning
Cognitive Computation,
2023
DOI:10.1007/s12559-023-10139-2
|
|
|
[11]
|
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree
IEEE Access,
2023
DOI:10.1109/ACCESS.2023.3296444
|
|
|
[12]
|
Detection of Network Attacks using Machine Learning and Deep Learning Models
Procedia Computer Science,
2023
DOI:10.1016/j.procs.2022.12.401
|
|
|
[13]
|
Detection of Network Attacks using Machine Learning and Deep Learning Models
Procedia Computer Science,
2023
DOI:10.1016/j.procs.2022.12.401
|
|
|
[14]
|
Machine Learning Models to Classify Normal and Fibrotic Mouse Liver Model using Dielectric Properties
2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM),
2022
DOI:10.1109/BIBM55620.2022.9995397
|
|
|
[15]
|
Detection of Intrusions and Malware, and Vulnerability Assessment
Lecture Notes in Computer Science,
2022
DOI:10.1007/978-3-031-09484-2_2
|
|
|
[16]
|
Intrusion detection in cyber–physical environment using hybrid Naïve Bayes—Decision table and multi-objective evolutionary feature selection
Computer Communications,
2022
DOI:10.1016/j.comcom.2022.03.009
|
|
|
[17]
|
Intrusion detection in cyber–physical environment using hybrid Naïve Bayes—Decision table and multi-objective evolutionary feature selection
Computer Communications,
2022
DOI:10.1016/j.comcom.2022.03.009
|
|
|
[18]
|
Machine Learning Models to Classify Normal and Fibrotic Mouse Liver Model using Dielectric Properties
2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM),
2022
DOI:10.1109/BIBM55620.2022.9995397
|
|
|
[19]
|
Intrusion Detection System Based on Machine Learning Techniques: A Survey
2022 2nd International Conference on Advances in Engineering Science and Technology (AEST),
2022
DOI:10.1109/AEST55805.2022.10413072
|
|
|
[20]
|
A Consolidated Decision Tree-Based Intrusion Detection System for Binary and Multiclass Imbalanced Datasets
Mathematics,
2021
DOI:10.3390/math9070751
|
|
|
[21]
|
Intelligent Systems, Technologies and Applications
Advances in Intelligent Systems and Computing,
2021
DOI:10.1007/978-981-16-0730-1_4
|
|
|
[22]
|
A Consolidated Decision Tree-Based Intrusion Detection System for Binary and Multiclass Imbalanced Datasets
Mathematics,
2021
DOI:10.3390/math9070751
|
|
|
[23]
|
Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity
Energies,
2020
DOI:10.3390/en13102509
|
|
|
[24]
|
Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity
Energies,
2020
DOI:10.3390/en13102509
|
|
|
[25]
|
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
Applied Sciences,
2019
DOI:10.3390/app9204396
|
|
|
[26]
|
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset
Future Generation Computer Systems,
2019
DOI:10.1016/j.future.2019.05.041
|
|
|
[27]
|
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
Applied Sciences,
2019
DOI:10.3390/app9204396
|
|
|
[28]
|
A Case Study on using Deep Learning for Network Intrusion Detection
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM),
2019
DOI:10.1109/MILCOM47813.2019.9020824
|
|
|
[29]
|
Network Intrusion Detection Using Flow Statistics
2018 IEEE Statistical Signal Processing Workshop (SSP),
2018
DOI:10.1109/SSP.2018.8450709
|
|
|
[30]
|
A hybrid architecture to enrich context awareness through data correlation
Proceedings of the 33rd Annual ACM Symposium on Applied Computing,
2018
DOI:10.1145/3167132.3167405
|
|
|
[31]
|
Machine Learning and Deep Learning Methods for Cybersecurity
IEEE Access,
2018
DOI:10.1109/ACCESS.2018.2836950
|
|
|
[32]
|
Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space
Cognitive Computation,
2018
DOI:10.1007/s12559-018-9564-y
|
|
|
[33]
|
Mining Anomalies in Large ISCX Dataset Using Machine Learning Algorithms in KNIME
SSRN Electronic Journal ,
2018
DOI:10.2139/ssrn.3170295
|
|
|
[34]
|
A hybrid architecture to enrich context awareness through data correlation
Proceedings of the 33rd Annual ACM Symposium on Applied Computing,
2018
DOI:10.1145/3167132.3167405
|
|
|