Journal articles on the topic 'Light-based Intrusion classification system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Light-based Intrusion classification system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jecheva, Veselina, and Evgeniya Nikolova. "Classification Trees as a Technique for Creating Anomaly-Based Intrusion Detection Systems." Serdica Journal of Computing 3, no. 4 (January 11, 2010): 335–58. http://dx.doi.org/10.55630/sjc.2009.3.335-358.
Full textSandosh, S., Dr V. Govindasamy, and Dr G. Akila. "Novel Pattern Matching based Alert Classification Approach For Intrusion Detection System." Journal of Advanced Research in Dynamical and Control Systems 11, no. 11-SPECIAL ISSUE (November 29, 2019): 279–89. http://dx.doi.org/10.5373/jardcs/v11sp11/20193032.
Full textKamble, Arvind, and Virendra S. Malemath. "Adam Improved Rider Optimization-Based Deep Recurrent Neural Network for the Intrusion Detection in Cyber Physical Systems." International Journal of Swarm Intelligence Research 13, no. 3 (July 1, 2022): 1–22. http://dx.doi.org/10.4018/ijsir.304402.
Full textAhmad, Iftikhar, Qazi Emad Ul Haq, Muhammad Imran, Madini O. Alassafi, and Rayed A. AlGhamdi. "An Efficient Network Intrusion Detection and Classification System." Mathematics 10, no. 3 (February 8, 2022): 530. http://dx.doi.org/10.3390/math10030530.
Full textMohammed, Bilal, and Ekhlas K. Gbashi. "Intrusion Detection System for NSL-KDD Dataset Based on Deep Learning and Recursive Feature Elimination." Engineering and Technology Journal 39, no. 7 (July 25, 2021): 1069–79. http://dx.doi.org/10.30684/etj.v39i7.1695.
Full textAli, Rashid, and Supriya Kamthania. "A Comparative Study of Different Relevant Features Hybrid Neural Networks Based Intrusion Detection Systems." Advanced Materials Research 403-408 (November 2011): 4703–10. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4703.
Full textUgendhar, A., Babu Illuri, Sridhar Reddy Vulapula, Marepalli Radha, Sukanya K, Fayadh Alenezi, Sara A. Althubiti, and Kemal Polat. "A Novel Intelligent-Based Intrusion Detection System Approach Using Deep Multilayer Classification." Mathematical Problems in Engineering 2022 (May 6, 2022): 1–10. http://dx.doi.org/10.1155/2022/8030510.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (December 31, 2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAfzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (December 31, 2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Full textAlzahrani, Mohammed Saeed, and Fawaz Waselallah Alsaade. "Computational Intelligence Approaches in Developing Cyberattack Detection System." Computational Intelligence and Neuroscience 2022 (March 18, 2022): 1–16. http://dx.doi.org/10.1155/2022/4705325.
Full textMulyanto, Mulyanto, Muhamad Faisal, Setya Widyawan Prakosa, and Jenq-Shiou Leu. "Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems." Symmetry 13, no. 1 (December 22, 2020): 4. http://dx.doi.org/10.3390/sym13010004.
Full textWang, Li Fang. "Anomaly Intrusion Detection Based on Concept Lattice." Applied Mechanics and Materials 220-223 (November 2012): 2388–92. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2388.
Full textZhao, Xuemin. "Application of Data Mining Technology in Software Intrusion Detection and Information Processing." Wireless Communications and Mobile Computing 2022 (June 9, 2022): 1–8. http://dx.doi.org/10.1155/2022/3829160.
Full textKhattab M. Ali Alheeti, Ali Azawii Abdu Lateef, Abdulkareem Alzahrani, Azhar Imran, and Duaa Al_Dosary. "Cloud Intrusion Detection System Based on SVM." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 11 (June 7, 2023): 101–14. http://dx.doi.org/10.3991/ijim.v17i11.39063.
Full textGanapathy, S., P. Yogesh, and A. Kannan. "Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM." Computational Intelligence and Neuroscience 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/850259.
Full textAlwan, Karrar, Ahmed AbuEl-Atta, and Hala Zayed. "Feature Selection Models Based on Hybrid Firefly Algorithm with Mutation Operator for Network Intrusion Detection." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 192–202. http://dx.doi.org/10.22266/ijies2021.0228.19.
Full textLaxkar, Pradeep, and Prasun Chakrabarti. "Comparison of intrusion detection system based on feature extraction." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 536. http://dx.doi.org/10.14419/ijet.v7i2.33.14829.
Full textPreethi D. and Neelu Khare. "An Intelligent Network Intrusion Detection System Using Particle Swarm Optimization (PSO) and Deep Network Networks (DNN)." International Journal of Swarm Intelligence Research 12, no. 2 (April 2021): 57–73. http://dx.doi.org/10.4018/ijsir.2021040104.
Full textWang, Qian, Wenfang Zhao, and Jiadong Ren. "Intrusion detection algorithm based on image enhanced convolutional neural network." Journal of Intelligent & Fuzzy Systems 41, no. 1 (August 11, 2021): 2183–94. http://dx.doi.org/10.3233/jifs-210863.
Full textAlzubi, Omar A., Jafar A. Alzubi, Moutaz Alazab, Adnan Alrabea, Albara Awajan, and Issa Qiqieh. "Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment." Electronics 11, no. 19 (September 22, 2022): 3007. http://dx.doi.org/10.3390/electronics11193007.
Full textKumar, Kapil, Arvind Kumar, Vimal Kumar, and Sunil Kumar. "A Hybrid Classification Technique for Enhancing the Effectiveness of Intrusion Detection Systems Using Machine Learning." International Journal of Organizational and Collective Intelligence 12, no. 1 (January 2022): 1–18. http://dx.doi.org/10.4018/ijoci.2022010102.
Full textPamela Vinitha Eric, Mathiyalagan R,. "An Efficient Intrusion Detection System Using Improved Bias Based Convolutional Neural Network Classifier." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2468–82. http://dx.doi.org/10.17762/turcomat.v12i6.5689.
Full textLee, JooHwa, and KeeHyun Park. "AE-CGAN Model based High Performance Network Intrusion Detection System." Applied Sciences 9, no. 20 (October 10, 2019): 4221. http://dx.doi.org/10.3390/app9204221.
Full textImrana, Yakubu, Yanping Xiang, Liaqat Ali, Zaharawu Abdul-Rauf, Yu-Chen Hu, Seifedine Kadry, and Sangsoon Lim. "χ2-BidLSTM: A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM." Sensors 22, no. 5 (March 4, 2022): 2018. http://dx.doi.org/10.3390/s22052018.
Full textHan, Jonghoo, and Wooguil Pak. "Hierarchical LSTM-Based Network Intrusion Detection System Using Hybrid Classification." Applied Sciences 13, no. 5 (February 27, 2023): 3089. http://dx.doi.org/10.3390/app13053089.
Full textKumar, Yadala Prabhu, and Burra Vijaya Babu. "Stabbing of Intrusion with Learning Framework Using Auto Encoder Based Intellectual Enhanced Linear Support Vector Machine for Feature Dimensionality Reduction." Revue d'Intelligence Artificielle 36, no. 5 (December 23, 2022): 737–43. http://dx.doi.org/10.18280/ria.360511.
Full textPreethi D. and Neelu Khare. "EFS-LSTM (Ensemble-Based Feature Selection With LSTM) Classifier for Intrusion Detection System." International Journal of e-Collaboration 16, no. 4 (October 2020): 72–86. http://dx.doi.org/10.4018/ijec.2020100106.
Full textPriyadarsini, Pullagura Indira, and G. Anuradha. "A novel ensemble modeling for intrusion detection system." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1963. http://dx.doi.org/10.11591/ijece.v10i2.pp1963-1971.
Full textLodhi, Mala Bharti, Vineet Richhariya, and Mahesh Parmar. "AN IMPLEMENTATION OF IDS IN A HYBRID APPROACH AND KDD CUP DATASET." International Journal of Research -GRANTHAALAYAH 2, no. 3 (December 31, 2014): 1–9. http://dx.doi.org/10.29121/granthaalayah.v2.i3.2014.3055.
Full textYuhong Wu, Yuhong Wu, and Xiangdong Hu Yuhong Wu. "AMS Intrusion Detection Method Based on Improved Generalized Regression Neural Network." 網際網路技術學刊 24, no. 2 (March 2023): 549–63. http://dx.doi.org/10.53106/160792642023032402029.
Full textKannan, Anand, Karthik Gururajan Venkatesan, Alexandra Stagkopoulou, Sheng Li, Sathyavakeeswaran Krishnan, and Arifur Rahman. "A Novel Cloud Intrusion Detection System Using Feature Selection and Classification." International Journal of Intelligent Information Technologies 11, no. 4 (October 2015): 1–15. http://dx.doi.org/10.4018/ijiit.2015100101.
Full textAbdulameer, Hasan, Inam Musa, and Noora Salim Al-Sultani. "Three level intrusion detection system based on conditional generative adversarial network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (April 1, 2023): 2240. http://dx.doi.org/10.11591/ijece.v13i2.pp2240-2258.
Full textVishwakarma, Uma, Prof Anurag Jain, and Prof Akriti Jain. "A Review of Feature Reduction in Intrusion Detection System Based on Artificial Immune System and Neural Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 3 (July 15, 2013): 1127–33. http://dx.doi.org/10.24297/ijct.v9i3.3338.
Full textCai, Yu. "Mobile Agent Based Network Defense System in Enterprise Network." International Journal of Handheld Computing Research 2, no. 1 (January 2011): 41–54. http://dx.doi.org/10.4018/jhcr.2011010103.
Full textGondal, Farzana Kausar. "Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review." Innovative Computing Review 1, no. 2 (December 26, 2021): 85–102. http://dx.doi.org/10.32350/icr.0102.05.
Full textAbuadlla, Yousef, Omran Ben Taher, and Hesham Elzentani. "Flow Based Intrusion Detection System Using Multistage Neural Network." مجلة الجامعة الأسمرية: العلوم التطبيقية 2, no. 2 (December 30, 2017): 87–77. http://dx.doi.org/10.59743/aujas.v2i2.1158.
Full textWu, Yuhong, and Xiangdong Hu. "An Intrusion Detection Method Based on Fully Connected Recurrent Neural Network." Scientific Programming 2022 (September 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/7777211.
Full textPise, Nitin. "APPLICATION OF MACHINE LEARNING FOR INTRUSION DETECTION SYSTEM." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 1, 2021): 314–23. http://dx.doi.org/10.17762/itii.v9i1.134.
Full textPietro Spadaccino and Francesca Cuomo. "Intrusion detection systems for IoT: Opportunities and challenges offered by edge computing." ITU Journal on Future and Evolving Technologies 3, no. 2 (September 22, 2022): 408–20. http://dx.doi.org/10.52953/wnvi5792.
Full textTian, Yuyang. "Abnormal Traffic Prediction and Classification based on Information Big Data." Highlights in Science, Engineering and Technology 23 (December 3, 2022): 145–53. http://dx.doi.org/10.54097/hset.v23i.3216.
Full textAlmuhairi, Thani, Ahmad Almarri, and Khalid Hokal. "An Artificial Intelligence-based Intrusion Detection System." Journal of Cybersecurity and Information Management 07, no. 02 (April 1, 2021): 95–111. http://dx.doi.org/10.54216/jcim.07.02.04.
Full textDuhayyim, Mesfer Al, Khalid A. Alissa, Fatma S. Alrayes, Saud S. Alotaibi, ElSayed M. Tag El Din, Amgad Atta Abdelmageed, Ishfaq Yaseen, and Abdelwahed Motwakel. "Evolutionary-Based Deep Stacked Autoencoder for Intrusion Detection in a Cloud-Based Cyber-Physical System." Applied Sciences 12, no. 14 (July 7, 2022): 6875. http://dx.doi.org/10.3390/app12146875.
Full textAbdulrahman, Amer A., and Mahmood K. Ibrahem. "Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms." Iraqi Journal of Information & Communications Technology 1, no. 3 (February 1, 2019): 49–55. http://dx.doi.org/10.31987/ijict.1.3.40.
Full textJiang, Xue Song, Xiu Mei Wei, and Yu Shui Geng. "The Research of Intrusion Detection System Based on ANN on Cloud Platform." Applied Mechanics and Materials 263-266 (December 2012): 2962–65. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2962.
Full textSampath, Nithya, and Dinakaran M. "Flow Based Classification for Specification Based Intrusion Detection in Software Defined Networking." International Journal of Software Innovation 7, no. 2 (April 2019): 1–8. http://dx.doi.org/10.4018/ijsi.2019040101.
Full textFarhana, Kaniz, Maqsudur Rahman, and Md Tofael Ahmed. "An intrusion detection system for packet and flow based networks using deep neural network approach." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (October 1, 2020): 5514. http://dx.doi.org/10.11591/ijece.v10i5.pp5514-5525.
Full textZhou, Yulin, Lun Xie, and Hang Pan. "Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms." Applied Sciences 12, no. 6 (March 8, 2022): 2765. http://dx.doi.org/10.3390/app12062765.
Full textLi, Wenchao, Ping Yi, Yue Wu, Li Pan, and Jianhua Li. "A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network." Journal of Electrical and Computer Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/240217.
Full textHussien et al., Zaid. "Anomaly Detection Approach Based on Deep Neural Network and Dropout." Baghdad Science Journal 17, no. 2(SI) (June 23, 2020): 0701. http://dx.doi.org/10.21123/bsj.2020.17.2(si).0701.
Full textProtić, Danijela. "Intrusion detection based on the artificial immune system." Vojnotehnicki glasnik 68, no. 4 (2020): 790–803. http://dx.doi.org/10.5937/vojtehg68-27954.
Full text