• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4625221)   Today's Articles (1553)   Subscriber (49511)
For: Kocher G, Kumar G. Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft comput 2021;25:9731-63. [DOI: 10.1007/s00500-021-05893-0] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
Number Cited by Other Article(s)
1
Mo Y, Li H, Wang D, Liu G. An intrusion detection system based on convolution neural network. PeerJ Comput Sci 2024;10:e2152. [PMID: 38983193 PMCID: PMC11232621 DOI: 10.7717/peerj-cs.2152] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/31/2024] [Accepted: 06/05/2024] [Indexed: 07/11/2024]
2
Chai G, Li S, Yang Y, Zhou G, Wang Y. CTSF: An Intrusion Detection Framework for Industrial Internet Based on Enhanced Feature Extraction and Decision Optimization Approach. SENSORS (BASEL, SWITZERLAND) 2023;23:8793. [PMID: 37960495 PMCID: PMC10647644 DOI: 10.3390/s23218793] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/27/2023] [Revised: 10/20/2023] [Accepted: 10/27/2023] [Indexed: 11/15/2023]
3
El-Rady AA, Osama H, Sadik R, El Badwy H. Network Intrusion Detection CNN Model for Realistic Network Attacks Based on Network Traffic Classification. 2023 40TH NATIONAL RADIO SCIENCE CONFERENCE (NRSC) 2023. [DOI: 10.1109/nrsc58893.2023.10152872] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
4
Class-biased sarcasm detection using BiLSTM variational autoencoder-based synthetic oversampling. Soft comput 2023. [DOI: 10.1007/s00500-023-07956-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/09/2023]
5
Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems. ALGORITHMS 2022. [DOI: 10.3390/a15080258] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]
6
Yoshimura N, Kuzuno H, Shiraishi Y, Morii M. DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic. SENSORS (BASEL, SWITZERLAND) 2022;22:4405. [PMID: 35746191 PMCID: PMC9227447 DOI: 10.3390/s22124405] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/16/2022] [Revised: 06/04/2022] [Accepted: 06/07/2022] [Indexed: 06/15/2023]
7
The Comparison of Cybersecurity Datasets. DATA 2022. [DOI: 10.3390/data7020022] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/15/2022]  Open
8
PlantNet: transfer learning-based fine-grained network for high-throughput plants recognition. Soft comput 2022. [DOI: 10.1007/s00500-021-06689-y] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA