Zacytuj

T. G. Dietterich, An experimental comparison of three methods for constructing ensembles of decision trees: bagging, boosting, and randomization. Machine Learning, 2000.40 (2):pp.139-157. Search in Google Scholar

R. E. Schapire and Y. Singer, BoosTexter: A Boosting-based System for Text Categorization. Machine Learning, 2000.39 (2):pp.135-168. Search in Google Scholar

M. Collins, R. E. Schapire and Y. Singer, Logistic Regression, AdaBoost and Bregman Distances. Machine Learning, 2002.48 (1):pp.253-285. Search in Google Scholar

R. A. de Assis, R. Pazim, M. C. Malavazi, P. P. da C. Petry, L. M. E. de Assis and E. Venturino, A Mathematical Model to describe the herd behaviour considering group defense. Applied Mathematics and Nonlinear Sciences, 2020.5 (1):pp.11-24. Search in Google Scholar

T. Xie, R. Liu and Z. Wei, Improvement of the Fast Clustering Algorithm Improved by K-Means in the Big Data. Applied Mathematics and Nonlinear Sciences, 2020.5 (1):pp.1-10. Search in Google Scholar

S. Yin, P. Ouyang, X. Dai, L. Liu and S. Wei, An AdaBoost-Based Face Detection System Using Parallel Configurable Architecture With Optimized Computation. IEEE Systems Journal, 2017.11 (1):pp.260-271. Search in Google Scholar

S.W. Foo, Y. Lian and L. Dong, Recognition of visual speech elements using adaptively boosted hidden Markov models. IEEE Transactions on Circuits and Systems for Video Technology, 2004.14 (5):pp.693-705. Search in Google Scholar

W. Hu, J. Gao, Y. Wang, O. Wu and S. Maybank, Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection, in IEEE Transactions on Cybernetics, 2014.44 (1):pp.66-82. Search in Google Scholar

H. J. Liao, C. H. Richard Lin, Y. C. Lin and K. Y. Tung, Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 2013.36 (1):pp.16-24. Search in Google Scholar

A. L. Buczak and E. Guven, A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys and Tutorials, 2016.18 (2):pp.1153-1176. Search in Google Scholar

S. Iglesias Pérez, S. Moral-Rubio and R. Criado, A new approach to combine multiplex networks and time series attributes: Building intrusion detection systems (IDS) in cybersecurity. Chaos, Solitons and Fractals, 2021.150: pp.111143. Search in Google Scholar

M. Wei and K. Kim, Intrusion detection scheme using traffic prediction for wireless industrial networks. Journal of Communications and Networks, 2012.14 (3):pp.310-318. Search in Google Scholar

J. Peng, K. R. Choo and H. Ashman, User profiling in intrusion detection: A review. Journal of Network and Computer Applications, 2016.72:pp.14-27. Search in Google Scholar

M. Safaldin, M. Otair and L. Abualigah, Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 2020.12 (2):pp.1559-1576. Search in Google Scholar

J. C. Joseph, B. S. Lee, A. Das and B. C. Seet, Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA. IEEE Transactions on Dependable and Secure Computing, 2011.8 (2):pp.233-245. Search in Google Scholar

W. Alhakami, A. ALharbi, Abdullah, S. Bourouis, R. Alroobaea and N. Bouguila, Network Anomaly Intrusion Detection Using a Nonparametric Bayesian Approach and Feature Selection. IEEE Access, 2019.7:pp.52181-52190. Search in Google Scholar

Y. C. Wu, F. Yin and C. L. Liu, Improving handwritten Chinese text recognition using neural network language models and convolutional neural network shape models. Pattern Recognition, 2017.65: pp.251-264. Search in Google Scholar

H. Yang & F. Wang, Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network. IEEE Access, 2019.7: pp.64366-64374. Search in Google Scholar

N. Ye and Q. Chen, An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Quality and Reliability Engineering International, 2001.17 (2):pp.105-112. Search in Google Scholar

A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer and B.D. Payne, Evaluating Computer Intrusion Detection Systems. ACM Computing Surveys, 2015.48 (1):pp.1-41. Search in Google Scholar

P. Velarde Alvarado, R. Martinez Pelaez, L. J. Mena-Camaré, A. M. Ochoa Brust, E. Moreno Garcia, J. D. J. Ceballos Mejia and A. Iriarte-Solis, Spatial and Temporal Characterization of Network Traffic for Intrusion Detection Based on Information Theory. International Journal of Technology, Knowledge and Society, 2018.14 (2):pp.1-7. Search in Google Scholar

H. Zhang, L. Huang, C. Q. Wu and Z. Li, An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset. Computer Networks (Amsterdam, Netherlands: 1999), 2020.177:pp.107315. Search in Google Scholar

Y. Chen, N. Ashizawa, C. K. Yeo, N. Yanai and S. Yean, Multi-scale Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for unsupervised intrusion detection. Knowledge-based Systems, 2021.224:pp.107086. Search in Google Scholar

S. Otoum, B. Kantarci and H. T. Mouftah. On the Feasibility of Deep Learning in Sensor Network Intrusion Detection. IEEE Networking Letters, 2019.1 (2): pp.68-71. Search in Google Scholar

C. F. Tsai, Y. F. Hsu, C. Y. Lin, W. Y. Lin, Intrusion detection by machine learning: A review. Expert Systems with applications, 2009.36 (10): pp.11994-12000. Search in Google Scholar

eISSN:
2444-8656
Język:
Angielski
Częstotliwość wydawania:
Volume Open
Dziedziny czasopisma:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics