Data mining techniques in intrusion detection systems: A systematic literature review
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …
scalability, in which data mining techniques are playing an increasingly important role. We …
A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET)
G Indirani, K Selvakumar - International Journal of Parallel …, 2014 - Taylor & Francis
In mobile ad hoc network (MANET), the issues such as limited bandwidth availability,
dynamic connectivity and so on cause the process of intrusion detection to be more …
dynamic connectivity and so on cause the process of intrusion detection to be more …
[PDF][PDF] Modelo predictivo de deserción estudiantil basado en arboles de decisión
Este artículo muestra la construcción de un modelo predictivo de deserción estudiantil, para
pronosticar la probabilidad, que un estudiante abandone su programa académico …
pronosticar la probabilidad, que un estudiante abandone su programa académico …
Application of the performance of machine learning techniques as support in the prediction of school dropout
AL Jiménez-Gutiérrez, CI Mota-Hernández… - Scientific Reports, 2024 - nature.com
This article presents a study, intending to design a model with 90% reliability, which helps in
the prediction of school dropouts in higher and secondary education institutions …
the prediction of school dropouts in higher and secondary education institutions …
[PDF][PDF] A text mining-based anomaly detection model in network security
M Kakavand, N Mustapha, A Mustapha… - Global Journal of …, 2015 - academia.edu
Putra University, Malaysia Abstract-Anomaly detection systems are extensively used security
tools to detect cyber-threats and attack activities in computer systems and networks. In this …
tools to detect cyber-threats and attack activities in computer systems and networks. In this …
An improved watchdog technique based on power-aware hierarchical design for ids in wireless sensor networks
A Forootaninia, MB Ghaznavi-Ghoushchi - arXiv preprint arXiv:1208.2079, 2012 - arxiv.org
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial.
Wireless sensor networks in comparison with wired networks are more substantially …
Wireless sensor networks in comparison with wired networks are more substantially …
[PDF][PDF] A Cloud FCM based intrusion detection model in a MANET environment
JS Manoharan, P Muralidharan, G Jayaseelan - International Journal for …, 2017 - ijrdt.org
With the advent of ad-hoc networks, there has been a great boost in communication
methodologies in the wireless domain. Numerous research contributions have been made …
methodologies in the wireless domain. Numerous research contributions have been made …
Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques
F Salo - 2019 - search.proquest.com
The enormous development in the connectivity among different type of networks poses
significant concerns in terms of privacy and security. As such, the exponential expansion in …
significant concerns in terms of privacy and security. As such, the exponential expansion in …
[PDF][PDF] A technical review on intrusion detection system
SK Patel, UH Mehta, UM Patel, DH Bhagat… - International Journal of …, 2015 - ijcset.com
Network security is a big issue at present for large organizations. There are many types of
Intrusion Detection Systems like Host Based IDS, Network Based IDS, Anomaly Based IDS …
Intrusion Detection Systems like Host Based IDS, Network Based IDS, Anomaly Based IDS …
[HTML][HTML] Fuzzy Based Detection And Swarm Based Authenticated Routing In Manet
K Shanthi, T Jebarajan, P Sampath, W AMITABH… - Journal of Theoretical …, 2014 - jatit.org
In mobile ad hoc networks (MANET), Artificial Intelligence (AI) based distributed intrusion
detection (DIDS) techniques are very rarely available. In general, these techniques are used …
detection (DIDS) techniques are very rarely available. In general, these techniques are used …