Intelligent feature selection and classification techniques for intrusion detection in networks: a survey
Rapid growth in the Internet usage and diverse military applications have led researchers to
think of intelligent systems that can assist the users and applications in getting the services …
think of intelligent systems that can assist the users and applications in getting the services …
Clustering-based network intrusion detection
Recently data mining methods have gained importance in addressing network security
issues, including network intrusion detection—a challenging task in network security …
issues, including network intrusion detection—a challenging task in network security …
Inteligencia artificial al servicio de la auditoría: una revisión sistemática de literatura
AYM Hernandez, FJV Duque - Revista Ibérica de Sistemas e …, 2020 - search.proquest.com
Applying artificial intelligence techniques in the field of auditing promises to be an effective
strategy when improving efficiency and productivity in these processes and therefore in the …
strategy when improving efficiency and productivity in these processes and therefore in the …
General study of intrusion detection system and survey of agent based intrusion detection system
In today's world one of the most severe threat to computer security is the illegal intrusion into
a computer system. As the network applications are growing rapidly, new sort of network …
a computer system. As the network applications are growing rapidly, new sort of network …
Biological feature selection and classification techniques for intrusion detection on BAT
S Narayanasami, S Sengan, S Khurram… - Wireless personal …, 2022 - Springer
Privacy is a significant problem in communications networks. As a factor, trustworthy
knowledge sharing in computer networks is essential. Intrusion Detection Systems consist of …
knowledge sharing in computer networks is essential. Intrusion Detection Systems consist of …
Hybrid Modified K‐Means with C4.5 for Intrusion Detection Systems in Multiagent Systems
W Laftah Al-Yaseen, Z Ali Othman… - The Scientific World …, 2015 - Wiley Online Library
Presently, the processing time and performance of intrusion detection systems are of great
importance due to the increased speed of traffic data networks and a growing number of …
importance due to the increased speed of traffic data networks and a growing number of …
[PDF][PDF] Evaluation of k-means clustering for effective intrusion detection and prevention in massive network traffic data
K Nalavade, BB Meshram - International Journal of Computer …, 2014 - academia.edu
With the growth of hacking and exploiting tools and invention of new ways of intrusion,
Intrusion detection and prevention is becoming the major challenge in the world of network …
Intrusion detection and prevention is becoming the major challenge in the world of network …
A distributed intrusion detection system based on agents
J Liu, L Li - 2008 IEEE Pacific-Asia Workshop on …, 2008 - ieeexplore.ieee.org
Due to the rapid growth of the network application, new kinds of network attacks are
emerging endlessly. So it is critical to protect the networks from attackers and the intrusion …
emerging endlessly. So it is critical to protect the networks from attackers and the intrusion …
A security model for detecting suspicious patterns in physical environment
S Fong, Z Yan - Third International Symposium on Information …, 2007 - ieeexplore.ieee.org
In the view of escalating global threat in security, it is imperative to have an automated
detection system that can pick up suspicious patterns of human movement in physical …
detection system that can pick up suspicious patterns of human movement in physical …
Conceptual modeling rules extracting for data streams
XD Zhu, ZQ Huang - Knowledge-Based Systems, 2008 - Elsevier
Data take the form of continuous data streams rather than traditional stored databases in a
growing number of applications, including network traffic monitoring, network intrusion …
growing number of applications, including network traffic monitoring, network intrusion …