Journal articles on the topic 'Light-based Intrusion classification system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Light-based Intrusion classification system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jecheva, Veselina, and Evgeniya Nikolova. "Classification Trees as a Technique for Creating Anomaly-Based Intrusion Detection Systems." Serdica Journal of Computing 3, no. 4 (2010): 335–58. http://dx.doi.org/10.55630/sjc.2009.3.335-358.
Full textSandosh, S., Dr V. Govindasamy, and Dr G. Akila. "Novel Pattern Matching based Alert Classification Approach For Intrusion Detection System." Journal of Advanced Research in Dynamical and Control Systems 11, no. 11-SPECIAL ISSUE (2019): 279–89. http://dx.doi.org/10.5373/jardcs/v11sp11/20193032.
Full textKamble, Arvind, and Virendra S. Malemath. "Adam Improved Rider Optimization-Based Deep Recurrent Neural Network for the Intrusion Detection in Cyber Physical Systems." International Journal of Swarm Intelligence Research 13, no. 3 (2022): 1–22. http://dx.doi.org/10.4018/ijsir.304402.
Full textAhmad, Iftikhar, Qazi Emad Ul Haq, Muhammad Imran, Madini O. Alassafi, and Rayed A. AlGhamdi. "An Efficient Network Intrusion Detection and Classification System." Mathematics 10, no. 3 (2022): 530. http://dx.doi.org/10.3390/math10030530.
Full textMohammed, Bilal, and Ekhlas K. Gbashi. "Intrusion Detection System for NSL-KDD Dataset Based on Deep Learning and Recursive Feature Elimination." Engineering and Technology Journal 39, no. 7 (2021): 1069–79. http://dx.doi.org/10.30684/etj.v39i7.1695.
Full textAli, Rashid, and Supriya Kamthania. "A Comparative Study of Different Relevant Features Hybrid Neural Networks Based Intrusion Detection Systems." Advanced Materials Research 403-408 (November 2011): 4703–10. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4703.
Full textUgendhar, A., Babu Illuri, Sridhar Reddy Vulapula, et al. "A Novel Intelligent-Based Intrusion Detection System Approach Using Deep Multilayer Classification." Mathematical Problems in Engineering 2022 (May 6, 2022): 1–10. http://dx.doi.org/10.1155/2022/8030510.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAlzahrani, Mohammed Saeed, and Fawaz Waselallah Alsaade. "Computational Intelligence Approaches in Developing Cyberattack Detection System." Computational Intelligence and Neuroscience 2022 (March 18, 2022): 1–16. http://dx.doi.org/10.1155/2022/4705325.
Full textMulyanto, Mulyanto, Muhamad Faisal, Setya Widyawan Prakosa, and Jenq-Shiou Leu. "Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems." Symmetry 13, no. 1 (2020): 4. http://dx.doi.org/10.3390/sym13010004.
Full textWang, Li Fang. "Anomaly Intrusion Detection Based on Concept Lattice." Applied Mechanics and Materials 220-223 (November 2012): 2388–92. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2388.
Full textZhao, Xuemin. "Application of Data Mining Technology in Software Intrusion Detection and Information Processing." Wireless Communications and Mobile Computing 2022 (June 9, 2022): 1–8. http://dx.doi.org/10.1155/2022/3829160.
Full textKhattab M. Ali Alheeti, Ali Azawii Abdu Lateef, Abdulkareem Alzahrani, Azhar Imran, and Duaa Al_Dosary. "Cloud Intrusion Detection System Based on SVM." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 11 (2023): 101–14. http://dx.doi.org/10.3991/ijim.v17i11.39063.
Full textGanapathy, S., P. Yogesh, and A. Kannan. "Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM." Computational Intelligence and Neuroscience 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/850259.
Full textAlwan, Karrar, Ahmed AbuEl-Atta, and Hala Zayed. "Feature Selection Models Based on Hybrid Firefly Algorithm with Mutation Operator for Network Intrusion Detection." International Journal of Intelligent Engineering and Systems 14, no. 1 (2021): 192–202. http://dx.doi.org/10.22266/ijies2021.0228.19.
Full textLaxkar, Pradeep, and Prasun Chakrabarti. "Comparison of intrusion detection system based on feature extraction." International Journal of Engineering & Technology 7, no. 3.3 (2018): 536. http://dx.doi.org/10.14419/ijet.v7i2.33.14829.
Full textPreethi D. and Neelu Khare. "An Intelligent Network Intrusion Detection System Using Particle Swarm Optimization (PSO) and Deep Network Networks (DNN)." International Journal of Swarm Intelligence Research 12, no. 2 (2021): 57–73. http://dx.doi.org/10.4018/ijsir.2021040104.
Full textWang, Qian, Wenfang Zhao, and Jiadong Ren. "Intrusion detection algorithm based on image enhanced convolutional neural network." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 2183–94. http://dx.doi.org/10.3233/jifs-210863.
Full textAlzubi, Omar A., Jafar A. Alzubi, Moutaz Alazab, Adnan Alrabea, Albara Awajan, and Issa Qiqieh. "Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment." Electronics 11, no. 19 (2022): 3007. http://dx.doi.org/10.3390/electronics11193007.
Full textKumar, Kapil, Arvind Kumar, Vimal Kumar, and Sunil Kumar. "A Hybrid Classification Technique for Enhancing the Effectiveness of Intrusion Detection Systems Using Machine Learning." International Journal of Organizational and Collective Intelligence 12, no. 1 (2022): 1–18. http://dx.doi.org/10.4018/ijoci.2022010102.
Full textPamela Vinitha Eric, Mathiyalagan R,. "An Efficient Intrusion Detection System Using Improved Bias Based Convolutional Neural Network Classifier." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 2468–82. http://dx.doi.org/10.17762/turcomat.v12i6.5689.
Full textLee, JooHwa, and KeeHyun Park. "AE-CGAN Model based High Performance Network Intrusion Detection System." Applied Sciences 9, no. 20 (2019): 4221. http://dx.doi.org/10.3390/app9204221.
Full textImrana, Yakubu, Yanping Xiang, Liaqat Ali та ін. "χ2-BidLSTM: A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM". Sensors 22, № 5 (2022): 2018. http://dx.doi.org/10.3390/s22052018.
Full textHan, Jonghoo, and Wooguil Pak. "Hierarchical LSTM-Based Network Intrusion Detection System Using Hybrid Classification." Applied Sciences 13, no. 5 (2023): 3089. http://dx.doi.org/10.3390/app13053089.
Full textKumar, Yadala Prabhu, and Burra Vijaya Babu. "Stabbing of Intrusion with Learning Framework Using Auto Encoder Based Intellectual Enhanced Linear Support Vector Machine for Feature Dimensionality Reduction." Revue d'Intelligence Artificielle 36, no. 5 (2022): 737–43. http://dx.doi.org/10.18280/ria.360511.
Full textPreethi D. and Neelu Khare. "EFS-LSTM (Ensemble-Based Feature Selection With LSTM) Classifier for Intrusion Detection System." International Journal of e-Collaboration 16, no. 4 (2020): 72–86. http://dx.doi.org/10.4018/ijec.2020100106.
Full textPriyadarsini, Pullagura Indira, and G. Anuradha. "A novel ensemble modeling for intrusion detection system." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (2020): 1963. http://dx.doi.org/10.11591/ijece.v10i2.pp1963-1971.
Full textLodhi, Mala Bharti, Vineet Richhariya, and Mahesh Parmar. "AN IMPLEMENTATION OF IDS IN A HYBRID APPROACH AND KDD CUP DATASET." International Journal of Research -GRANTHAALAYAH 2, no. 3 (2014): 1–9. http://dx.doi.org/10.29121/granthaalayah.v2.i3.2014.3055.
Full textYuhong Wu, Yuhong Wu, and Xiangdong Hu Yuhong Wu. "AMS Intrusion Detection Method Based on Improved Generalized Regression Neural Network." 網際網路技術學刊 24, no. 2 (2023): 549–63. http://dx.doi.org/10.53106/160792642023032402029.
Full textKannan, Anand, Karthik Gururajan Venkatesan, Alexandra Stagkopoulou, Sheng Li, Sathyavakeeswaran Krishnan, and Arifur Rahman. "A Novel Cloud Intrusion Detection System Using Feature Selection and Classification." International Journal of Intelligent Information Technologies 11, no. 4 (2015): 1–15. http://dx.doi.org/10.4018/ijiit.2015100101.
Full textAbdulameer, Hasan, Inam Musa, and Noora Salim Al-Sultani. "Three level intrusion detection system based on conditional generative adversarial network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 2240. http://dx.doi.org/10.11591/ijece.v13i2.pp2240-2258.
Full textVishwakarma, Uma, Prof Anurag Jain, and Prof Akriti Jain. "A Review of Feature Reduction in Intrusion Detection System Based on Artificial Immune System and Neural Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 3 (2013): 1127–33. http://dx.doi.org/10.24297/ijct.v9i3.3338.
Full textCai, Yu. "Mobile Agent Based Network Defense System in Enterprise Network." International Journal of Handheld Computing Research 2, no. 1 (2011): 41–54. http://dx.doi.org/10.4018/jhcr.2011010103.
Full textGondal, Farzana Kausar. "Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review." Innovative Computing Review 1, no. 2 (2021): 85–102. http://dx.doi.org/10.32350/icr.0102.05.
Full textAbuadlla, Yousef, Omran Ben Taher, and Hesham Elzentani. "Flow Based Intrusion Detection System Using Multistage Neural Network." مجلة الجامعة الأسمرية: العلوم التطبيقية 2, no. 2 (2017): 87–77. http://dx.doi.org/10.59743/aujas.v2i2.1158.
Full textWu, Yuhong, and Xiangdong Hu. "An Intrusion Detection Method Based on Fully Connected Recurrent Neural Network." Scientific Programming 2022 (September 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/7777211.
Full textPise, Nitin. "APPLICATION OF MACHINE LEARNING FOR INTRUSION DETECTION SYSTEM." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (2021): 314–23. http://dx.doi.org/10.17762/itii.v9i1.134.
Full textPietro Spadaccino and Francesca Cuomo. "Intrusion detection systems for IoT: Opportunities and challenges offered by edge computing." ITU Journal on Future and Evolving Technologies 3, no. 2 (2022): 408–20. http://dx.doi.org/10.52953/wnvi5792.
Full textTian, Yuyang. "Abnormal Traffic Prediction and Classification based on Information Big Data." Highlights in Science, Engineering and Technology 23 (December 3, 2022): 145–53. http://dx.doi.org/10.54097/hset.v23i.3216.
Full textAlmuhairi, Thani, Ahmad Almarri, and Khalid Hokal. "An Artificial Intelligence-based Intrusion Detection System." Journal of Cybersecurity and Information Management 07, no. 02 (2021): 95–111. http://dx.doi.org/10.54216/jcim.07.02.04.
Full textDuhayyim, Mesfer Al, Khalid A. Alissa, Fatma S. Alrayes, et al. "Evolutionary-Based Deep Stacked Autoencoder for Intrusion Detection in a Cloud-Based Cyber-Physical System." Applied Sciences 12, no. 14 (2022): 6875. http://dx.doi.org/10.3390/app12146875.
Full textAbdulrahman, Amer A., and Mahmood K. Ibrahem. "Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms." Iraqi Journal of Information & Communications Technology 1, no. 3 (2019): 49–55. http://dx.doi.org/10.31987/ijict.1.3.40.
Full textJiang, Xue Song, Xiu Mei Wei, and Yu Shui Geng. "The Research of Intrusion Detection System Based on ANN on Cloud Platform." Applied Mechanics and Materials 263-266 (December 2012): 2962–65. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2962.
Full textSampath, Nithya, and Dinakaran M. "Flow Based Classification for Specification Based Intrusion Detection in Software Defined Networking." International Journal of Software Innovation 7, no. 2 (2019): 1–8. http://dx.doi.org/10.4018/ijsi.2019040101.
Full textFarhana, Kaniz, Maqsudur Rahman, and Md Tofael Ahmed. "An intrusion detection system for packet and flow based networks using deep neural network approach." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5514. http://dx.doi.org/10.11591/ijece.v10i5.pp5514-5525.
Full textZhou, Yulin, Lun Xie, and Hang Pan. "Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms." Applied Sciences 12, no. 6 (2022): 2765. http://dx.doi.org/10.3390/app12062765.
Full textLi, Wenchao, Ping Yi, Yue Wu, Li Pan, and Jianhua Li. "A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network." Journal of Electrical and Computer Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/240217.
Full textHussien et al., Zaid. "Anomaly Detection Approach Based on Deep Neural Network and Dropout." Baghdad Science Journal 17, no. 2(SI) (2020): 0701. http://dx.doi.org/10.21123/bsj.2020.17.2(si).0701.
Full textProtić, Danijela. "Intrusion detection based on the artificial immune system." Vojnotehnicki glasnik 68, no. 4 (2020): 790–803. http://dx.doi.org/10.5937/vojtehg68-27954.
Full text