Data mining techniques in intrusion detection systems: A systematic literature review

F Salo, M Injadat, AB Nassif, A Shami, A Essex - IEEE Access, 2018 - ieeexplore.ieee.org
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …

A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET)

G Indirani, K Selvakumar - International Journal of Parallel …, 2014 - Taylor & Francis
In mobile ad hoc network (MANET), the issues such as limited bandwidth availability,
dynamic connectivity and so on cause the process of intrusion detection to be more …

[PDF][PDF] Modelo predictivo de deserción estudiantil basado en arboles de decisión

B Cuji, W Gavilanes, R Sánchez - Espacios, 2017 - ww.revistaespacios.com
Este artículo muestra la construcción de un modelo predictivo de deserción estudiantil, para
pronosticar la probabilidad, que un estudiante abandone su programa académico …

Application of the performance of machine learning techniques as support in the prediction of school dropout

AL Jiménez-Gutiérrez, CI Mota-Hernández… - Scientific Reports, 2024 - nature.com
This article presents a study, intending to design a model with 90% reliability, which helps in
the prediction of school dropouts in higher and secondary education institutions …

[PDF][PDF] A text mining-based anomaly detection model in network security

M Kakavand, N Mustapha, A Mustapha… - Global Journal of …, 2015 - academia.edu
Putra University, Malaysia Abstract-Anomaly detection systems are extensively used security
tools to detect cyber-threats and attack activities in computer systems and networks. In this …

An improved watchdog technique based on power-aware hierarchical design for ids in wireless sensor networks

A Forootaninia, MB Ghaznavi-Ghoushchi - arXiv preprint arXiv:1208.2079, 2012 - arxiv.org
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial.
Wireless sensor networks in comparison with wired networks are more substantially …

[PDF][PDF] A Cloud FCM based intrusion detection model in a MANET environment

JS Manoharan, P Muralidharan, G Jayaseelan - International Journal for …, 2017 - ijrdt.org
With the advent of ad-hoc networks, there has been a great boost in communication
methodologies in the wireless domain. Numerous research contributions have been made …

Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques

F Salo - 2019 - search.proquest.com
The enormous development in the connectivity among different type of networks poses
significant concerns in terms of privacy and security. As such, the exponential expansion in …

[PDF][PDF] A technical review on intrusion detection system

SK Patel, UH Mehta, UM Patel, DH Bhagat… - International Journal of …, 2015 - ijcset.com
Network security is a big issue at present for large organizations. There are many types of
Intrusion Detection Systems like Host Based IDS, Network Based IDS, Anomaly Based IDS …

[HTML][HTML] Fuzzy Based Detection And Swarm Based Authenticated Routing In Manet

K Shanthi, T Jebarajan, P Sampath, W AMITABH… - Journal of Theoretical …, 2014 - jatit.org
In mobile ad hoc networks (MANET), Artificial Intelligence (AI) based distributed intrusion
detection (DIDS) techniques are very rarely available. In general, these techniques are used …