• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4598322)   Today's Articles (12)   Subscriber (49356)
For: Gu J, Lu S. An effective intrusion detection approach using SVM with naïve Bayes feature embedding. Comput Secur 2021. [DOI: 10.1016/j.cose.2020.102158] [Citation(s) in RCA: 19] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/16/2022]
Number Cited by Other Article(s)
1
Han F, Yu J, Zhou G, Li S, Sun T. A comparative study on urban waterlogging susceptibility assessment based on multiple data-driven models. JOURNAL OF ENVIRONMENTAL MANAGEMENT 2024;360:121166. [PMID: 38781876 DOI: 10.1016/j.jenvman.2024.121166] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/22/2024] [Revised: 03/19/2024] [Accepted: 05/10/2024] [Indexed: 05/25/2024]
2
Wan X, Liu Y, Mei X, Ye J, Zeng C, Chen Y. A novel atrial fibrillation automatic detection algorithm based on ensemble learning and multi-feature discrimination. Med Biol Eng Comput 2024;62:1809-1820. [PMID: 38388761 DOI: 10.1007/s11517-024-03046-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/17/2023] [Accepted: 02/03/2024] [Indexed: 02/24/2024]
3
Mogollón Gutiérrez Ó, Sancho Núñez JC, Ávila M, Caro A. A detailed study of resampling algorithms for cyberattack classification in engineering applications. PeerJ Comput Sci 2024;10:e1975. [PMID: 38660195 PMCID: PMC11041950 DOI: 10.7717/peerj-cs.1975] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/12/2023] [Accepted: 03/11/2024] [Indexed: 04/26/2024]
4
Alohali MA, Elsadig M, Hilal AM, Mutwakel A. Emerging framework for attack detection in cyber-physical systems using heuristic-based optimization algorithm. PeerJ Comput Sci 2023;9:e1596. [PMID: 38192469 PMCID: PMC10773567 DOI: 10.7717/peerj-cs.1596] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/02/2023] [Accepted: 08/28/2023] [Indexed: 01/10/2024]
5
Ahsan M, Khusna H, Wibawati, Lee MH. Support vector data description with kernel density estimation (SVDD-KDE) control chart for network intrusion monitoring. Sci Rep 2023;13:19149. [PMID: 37932421 PMCID: PMC10628185 DOI: 10.1038/s41598-023-46719-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/07/2023] [Accepted: 11/03/2023] [Indexed: 11/08/2023]  Open
6
Abbas Q, Hina S, Sajjad H, Zaidi KS, Akbar R. Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems. PeerJ Comput Sci 2023;9:e1552. [PMID: 37705624 PMCID: PMC10496009 DOI: 10.7717/peerj-cs.1552] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/26/2023] [Accepted: 08/03/2023] [Indexed: 09/15/2023]
7
Yang M, Tan L, Chen X, Luo Y, Xu Z, Lan X. Laws and regulations tell how to classify your data: A case study on higher education. Inf Process Manag 2023. [DOI: 10.1016/j.ipm.2022.103240] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/29/2022]
8
Bhan R, Pamula R, Faruki P, Gajrani J. Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network. THE JOURNAL OF SUPERCOMPUTING 2023;79:1-42. [PMID: 37359328 PMCID: PMC10131528 DOI: 10.1007/s11227-023-05272-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 04/04/2023] [Indexed: 06/28/2023]
9
Yao W, Hu L, Hou Y, Li X. A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT. SENSORS (BASEL, SWITZERLAND) 2023;23:4141. [PMID: 37112482 PMCID: PMC10144792 DOI: 10.3390/s23084141] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 03/09/2023] [Revised: 04/12/2023] [Accepted: 04/18/2023] [Indexed: 06/19/2023]
10
Wu K, Qu H, Huang C. A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part. FUTURE INTERNET 2023. [DOI: 10.3390/fi15040128] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/30/2023]  Open
11
Catillo M, Pecchia A, Villano U. CPS-GUARD: Intrusion Detection for Cyber-Physical Systems and IoT Devices Using Outlier-Aware Deep Autoencoders. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103210] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/31/2023]
12
Han X, Cui S, Liu S, Zhang C, Jiang B, Lu Z. Network intrusion detection based on n-gram frequency and time-aware transformer. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103171] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/07/2023]
13
Xiong WD, Luo KL, Li R. AIDTF: Adversarial training framework for network intrusion detection. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103141] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/17/2023]
14
Zhang T, Chen W, Liu Y, Wu L. An Intrusion Detection Method Based on Stacked Sparse Autoencoder and Improved Gaussian Mixture Model. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103144] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/24/2023]
15
An effective intrusion detection approach based on ensemble learning for IIoT edge computing. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2022. [DOI: 10.1007/s11416-022-00456-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/15/2022]
16
Meta-Heuristic Optimization Algorithm-Based Hierarchical Intrusion Detection System. COMPUTERS 2022. [DOI: 10.3390/computers11120170] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
17
Zhang C, Jia D, Wang L, Wang W, Liu F, Yang A. Comparative Research on Network Intrusion Detection Methods Based on Machine Learning. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102861] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
18
Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method. Symmetry (Basel) 2022. [DOI: 10.3390/sym14061095] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]  Open
19
Wu Q, Wang H, Wang S. An efficient approach for discriminant analysis based on adaptive feature augmentation. J STAT COMPUT SIM 2022. [DOI: 10.1080/00949655.2022.2066672] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
20
An Emergency Event Detection Ensemble Model Based on Big Data. BIG DATA AND COGNITIVE COMPUTING 2022. [DOI: 10.3390/bdcc6020042] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]
21
Realguard: A Lightweight Network Intrusion Detection System for IoT Gateways. SENSORS 2022;22:s22020432. [PMID: 35062393 PMCID: PMC8778231 DOI: 10.3390/s22020432] [Citation(s) in RCA: 12] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/03/2021] [Revised: 12/24/2021] [Accepted: 12/27/2021] [Indexed: 02/01/2023]
22
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems. Comput Secur 2022. [DOI: 10.1016/j.cose.2021.102499] [Citation(s) in RCA: 12] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
23
Alazzam H, Sharieh A, Sabri KE. A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer. APPL INTELL 2021. [DOI: 10.1007/s10489-021-02621-x] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
24
Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft comput 2021. [DOI: 10.1007/s00500-021-05893-0] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA