Applications of artificial intelligence for disaster management

W Sun, P Bocchini, BD Davison - Natural Hazards, 2020 - Springer
Natural hazards have the potential to cause catastrophic damage and significant
socioeconomic loss. The actual damage and loss observed in the recent decades has …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM

J Liu, Y Gao, F Hu - Computers & Security, 2021 - Elsevier
Network intrusion detection systems play an important role in protecting the network from
attacks. However, Existing network intrusion data is imbalanced, which makes it difficult to …

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

H Hindy, D Brosset, E Bayne, AK Seeam… - IEEE …, 2020 - ieeexplore.ieee.org
As the world moves towards being increasingly dependent on computers and automation,
building secure applications, systems and networks are some of the main challenges faced …

A taxonomy and survey of intrusion detection system design techniques, network threats and datasets

H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis… - 2018 - strathprints.strath.ac.uk
With the world moving towards being increasingly dependent on computers and automation,
one of the main challenges in the current decade has been to build secure applications …

[图书][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems

S Elhag, A Fernández, A Bawakid, S Alshomrani… - Expert Systems with …, 2015 - Elsevier
Security policies of information systems and networks are designed for maintaining the
integrity of both the confidentiality and availability of the data for their trusted users …

[PDF][PDF] Towards Generating Real-life Datasets for Network Intrusion Detection.

MH Bhuyan, DK Bhattacharyya, JK Kalita - Int. J. Netw. Secur., 2015 - ijns.jalaxy.com.tw
With exponential growth in the number of computer applications and the sizes of networks,
the potential damage that can be caused by attacks launched over the Internet keeps …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

An enhanced intrusion detection system using particle swarm optimization feature extraction technique

RO Ogundokun, JB Awotunde, P Sadiku… - Procedia Computer …, 2021 - Elsevier
As the alarming growth of computer connectivity and the significant number of computer-
related applications increased lately, the challenge of achieving cyber-security has become …