A systematic literature review of intrusion detection system for network security: Research trends, datasets and methods
R Ferdiana - … 4th International Conference on Informatics and …, 2020 - ieeexplore.ieee.org
Study on intrusion detection system (IDS) mostly allow network administrators to focus on
development activities in terms of network security and making better use of resource. Many …
development activities in terms of network security and making better use of resource. Many …
A survey and taxonomy of the fuzzy signature-based intrusion detection systems
M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …
Comprehensive review of cybercrime detection techniques
WA Al-Khater, S Al-Maadeed, AA Ahmed… - IEEE …, 2020 - ieeexplore.ieee.org
Cybercrimes are cases of indictable offences and misdemeanors that involve computers or
communication tools as targets and commission instruments or are associated with the …
communication tools as targets and commission instruments or are associated with the …
Swarm intelligence inspired intrusion detection systems—a systematic literature review
Abstract An Intrusion Detection System (IDS) is one of the fundamental building blocks in
securing a network. A huge number of techniques have been proposed and implemented to …
securing a network. A huge number of techniques have been proposed and implemented to …
A diabetes monitoring system and health-medical service composition model in cloud environment
Diabetes is a common chronic illness or absence of sugar in the blood. The early detection
of this disease decreases the serious risk factor. Nowadays, Machine Learning based cloud …
of this disease decreases the serious risk factor. Nowadays, Machine Learning based cloud …
A systematic literature review on swarm intelligence based intrusion detection system: past, present and future
Swarm Intelligence (SI) has proven to be useful in solving issues that are difficult to solve
using traditional mathematical methodologies by using a collective behavior of a …
using traditional mathematical methodologies by using a collective behavior of a …
Building a fuzzy classifier based on whale optimization algorithm to detect network intrusions
The quantity of network attacks and the harm from them is constantly increasing, so the
detection of these attacks is an urgent task in the information security field. In this paper, we …
detection of these attacks is an urgent task in the information security field. In this paper, we …
Fuzzy min–max neural networks: a bibliometric and social network analysis
ÖN Kenger, E Özceylan - Neural Computing and Applications, 2023 - Springer
The amount of digital data in the universe is growing at an exponential rate with the rapid
development of digital information, and this reveals new machine learning methods …
development of digital information, and this reveals new machine learning methods …
Survey of fuzzy min–max neural network for pattern classification variants and applications
ON Al Sayaydeh, MF Mohammed… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Over the last few decades, pattern classification has become one of the most important fields
of artificial intelligence because it constitutes an essential component in many different real …
of artificial intelligence because it constitutes an essential component in many different real …
Hyperbox-based machine learning algorithms: a comprehensive survey
With the rapid development of digital information, the data volume generated by humans
and machines is growing exponentially. Along with this trend, machine learning algorithms …
and machines is growing exponentially. Along with this trend, machine learning algorithms …