• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4600962)   Today's Articles (1850)   Subscriber (49362)
For: Çavuşoğlu Ü. A new hybrid approach for intrusion detection using machine learning methods. APPL INTELL 2019;49:2735-61. [DOI: 10.1007/s10489-018-01408-x] [Citation(s) in RCA: 63] [Impact Index Per Article: 12.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
Number Cited by Other Article(s)
1
Hassan HA, Hemdan EE, El-Shafai W, Shokair M, El-Samie FEA. Intrusion Detection Systems for the Internet of Thing: A Survey Study. WIRELESS PERSONAL COMMUNICATIONS 2023;128:2753-2778. [DOI: 10.1007/s11277-022-10069-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 09/28/2022] [Indexed: 09/02/2023]
2
An Efficient Two-Stage Network Intrusion Detection System in the Internet of Things. INFORMATION 2023. [DOI: 10.3390/info14020077] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/03/2023]  Open
3
Sheelavathy K, Udaya Rani V. Detection IoT attacks using Lasso regression algorithm with ensemble classifier. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS 2022. [DOI: 10.1108/ijpcc-09-2022-0316] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/29/2022]
4
Ethala S, Kumarappan A. A Hybrid Spider Monkey and Hierarchical Particle Swarm Optimization Approach for Intrusion Detection on Internet of Things. SENSORS (BASEL, SWITZERLAND) 2022;22:8566. [PMID: 36366263 PMCID: PMC9654105 DOI: 10.3390/s22218566] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/06/2022] [Revised: 10/29/2022] [Accepted: 11/02/2022] [Indexed: 06/16/2023]
5
On-device context-aware misuse detection framework for heterogeneous IoT edge. APPL INTELL 2022. [DOI: 10.1007/s10489-022-04039-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
6
Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm. COMPUTERS 2022. [DOI: 10.3390/computers11100142] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
7
A novel hierarchical attention-based triplet network with unsupervised domain adaptation for network intrusion detection. APPL INTELL 2022. [DOI: 10.1007/s10489-022-04076-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
8
Prasad M, Tripathi S, Dahal K. A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network. APPL INTELL 2022. [DOI: 10.1007/s10489-022-03763-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
9
An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection. INFORMATION 2022. [DOI: 10.3390/info13070314] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
10
2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes. APPL INTELL 2021. [DOI: 10.1007/s10489-021-02347-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
11
The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review. COMPLEX INTELL SYST 2021. [DOI: 10.1007/s40747-021-00494-8] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
12
Network Intrusion Detection Based on an Efficient Neural Architecture Search. Symmetry (Basel) 2021. [DOI: 10.3390/sym13081453] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
13
Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions. Symmetry (Basel) 2021. [DOI: 10.3390/sym13071211] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
14
Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft comput 2021. [DOI: 10.1007/s00500-021-05893-0] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
15
Kumar P, Gupta GP, Tripathi R. Toward Design of an Intelligent Cyber Attack Detection System using Hybrid Feature Reduced Approach for IoT Networks. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2021. [DOI: 10.1007/s13369-020-05181-3] [Citation(s) in RCA: 30] [Impact Index Per Article: 10.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
16
Gu J, Lu S. An effective intrusion detection approach using SVM with naïve Bayes feature embedding. Comput Secur 2021. [DOI: 10.1016/j.cose.2020.102158] [Citation(s) in RCA: 19] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/16/2022]
17
Khan IA, Pi D, Khan N, Khan ZU, Hussain Y, Nawaz A, Ali F. A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks. APPL INTELL 2021. [DOI: 10.1007/s10489-021-02222-8] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
18
A weighted intrusion detection model of dynamic selection. APPL INTELL 2021. [DOI: 10.1007/s10489-020-02090-8] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
19
Maeda R, Mimura M. Automating post-exploitation with deep reinforcement learning. Comput Secur 2021. [DOI: 10.1016/j.cose.2020.102108] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
20
Cyber intrusion detection through association rule mining on multi-source logs. APPL INTELL 2020. [DOI: 10.1007/s10489-020-02007-5] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
21
Bedi P, Gupta N, Jindal V. I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems. APPL INTELL 2020. [DOI: 10.1007/s10489-020-01886-y] [Citation(s) in RCA: 39] [Impact Index Per Article: 9.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
22
Li J, Wu W, Xue D, Gao P. Multi-Source Deep Transfer Neural Network Algorithm. SENSORS 2019;19:s19183992. [PMID: 31527437 PMCID: PMC6767847 DOI: 10.3390/s19183992] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/26/2019] [Revised: 09/08/2019] [Accepted: 09/12/2019] [Indexed: 12/11/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA