• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4640428)   Today's Articles (1841)   Subscriber (50384)
For: Jaw E, Wang X. Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach. Symmetry (Basel) 2021;13:1764. [DOI: 10.3390/sym13101764] [Citation(s) in RCA: 15] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
Number Cited by Other Article(s)
1
Huang W, Tian H, Wang S, Zhang C, Zhang X. Integration of simulated annealing into pigeon inspired optimizer algorithm for feature selection in network intrusion detection systems. PeerJ Comput Sci 2024;10:e2176. [PMID: 39145221 PMCID: PMC11322994 DOI: 10.7717/peerj-cs.2176] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/18/2024] [Accepted: 06/12/2024] [Indexed: 08/16/2024]
2
Musthafa MB, Huda S, Kodera Y, Ali MA, Araki S, Mwaura J, Nogami Y. Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques. SENSORS (BASEL, SWITZERLAND) 2024;24:4293. [PMID: 39001072 PMCID: PMC11244377 DOI: 10.3390/s24134293] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/29/2024] [Revised: 06/26/2024] [Accepted: 06/27/2024] [Indexed: 07/16/2024]
3
Salman EH, Taher MA, Hammadi YI, Mahmood OA, Muthanna A, Koucheryavy A. An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms. SENSORS (BASEL, SWITZERLAND) 2022;23:s23010206. [PMID: 36616806 DOI: 10.3390/electronics11203332] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2022] [Revised: 12/10/2022] [Accepted: 12/22/2022] [Indexed: 05/27/2023]
4
Toward Efficient Intrusion Detection System Using Hybrid Deep Learning Approach. Symmetry (Basel) 2022. [DOI: 10.3390/sym14091916] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
5
Zeng H, Jiang S, Cui T, Lu Z, Li J, Lee BG, Zhu J, Yang X. ScatterHough: Automatic Lane Detection from Noisy LiDAR Data. SENSORS 2022;22:s22145424. [PMID: 35891101 PMCID: PMC9319445 DOI: 10.3390/s22145424] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/09/2022] [Revised: 07/05/2022] [Accepted: 07/18/2022] [Indexed: 12/02/2022]
6
Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems. Symmetry (Basel) 2022. [DOI: 10.3390/sym14071461] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/06/2023]  Open
7
Jaw E, Wang X. A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC). PeerJ Comput Sci 2022;8:e900. [PMID: 35494802 PMCID: PMC9044335 DOI: 10.7717/peerj-cs.900] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/05/2021] [Accepted: 02/01/2022] [Indexed: 06/14/2023]
8
TCAN-IDS: Intrusion Detection System for Internet of Vehicle Using Temporal Convolutional Attention Network. Symmetry (Basel) 2022. [DOI: 10.3390/sym14020310] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/06/2023]  Open
9
Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach. Symmetry (Basel) 2021. [DOI: 10.3390/sym13112192] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA