• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4617276)   Today's Articles (143)   Subscriber (49398)
For: Wazirali R. An Improved Intrusion Detection System Based on KNN Hyperparameter Tuning and Cross-Validation. Arab J Sci Eng 2020;45:10859-73. [DOI: 10.1007/s13369-020-04907-7] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Number Cited by Other Article(s)
1
Sharma RK, Issac B, Xin Q, Gadekallu TR, Nath K. Plant and Salamander Inspired Network Attack Detection and Data Recovery Model. SENSORS (BASEL, SWITZERLAND) 2023;23:5562. [PMID: 37420729 DOI: 10.3390/s23125562] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/15/2023] [Revised: 04/24/2023] [Accepted: 06/01/2023] [Indexed: 07/09/2023]
2
Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103176] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/12/2023]
3
An effective intrusion detection approach based on ensemble learning for IIoT edge computing. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2022. [DOI: 10.1007/s11416-022-00456-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/15/2022]
4
Chen T, Othman MM, Wang X, Zhu Y, Zhu Z, Xiao J. ECML driven geographical location of utility poles in smart grid: Data analysis and high-definition recognition. Appl Soft Comput 2022. [DOI: 10.1016/j.asoc.2022.109973] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/27/2022]
5
SUKRY: Suricata IDS with Enhanced kNN Algorithm on Raspberry Pi for Classifying IoT Botnet Attacks. ELECTRONICS 2022. [DOI: 10.3390/electronics11050737] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA