Journal articles on the topic 'Security of machine learning classifiers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security of machine learning classifiers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Atnafu, Surafel Mehari, and Prof (Dr ). Anuja Kumar Acharya. "Comparative Analysis of Intrusion Detection Attack Based on Machine Learning Classifiers." Indian Journal of Artificial Intelligence and Neural Networking 1, no. 2 (April 10, 2021): 22–28. http://dx.doi.org/10.35940/ijainn.b1025.041221.
Full textAtnafu, Surafel Mehari, and Prof (Dr ). Anuja Kumar Acharya. "Comparative Analysis of Intrusion Detection Attack Based on Machine Learning Classifiers." Indian Journal of Artificial Intelligence and Neural Networking 1, no. 2 (April 10, 2021): 22–28. http://dx.doi.org/10.54105/ijainn.b1025.041221.
Full textALGorain, Fahad T., and John A. Clark. "Covering Arrays ML HPO for Static Malware Detection." Eng 4, no. 1 (February 9, 2023): 543–54. http://dx.doi.org/10.3390/eng4010032.
Full textKatzir, Ziv, and Yuval Elovici. "Quantifying the resilience of machine learning classifiers used for cyber security." Expert Systems with Applications 92 (February 2018): 419–29. http://dx.doi.org/10.1016/j.eswa.2017.09.053.
Full textGongada, Sandhya Rani, Muktevi Chakravarthy, and Bhukya Mangu. "Power system contingency classification using machine learning technique." Bulletin of Electrical Engineering and Informatics 11, no. 6 (December 1, 2022): 3091–98. http://dx.doi.org/10.11591/eei.v11i6.4031.
Full textMehanović, Dželila, and Jasmin Kevrić. "Phishing Website Detection Using Machine Learning Classifiers Optimized by Feature Selection." Traitement du Signal 37, no. 4 (October 10, 2020): 563–69. http://dx.doi.org/10.18280/ts.370403.
Full textDeshmukh, Miss Maithili, and Dr M. A. Pund. "Implementation Paper on Network Data Verification Using Machine Learning Classifiers Based on Reduced Feature Dimensions." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2921–24. http://dx.doi.org/10.22214/ijraset.2022.41938.
Full textRunwal, Akshat. "Anomaly based Intrusion Detection System using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 255–60. http://dx.doi.org/10.22214/ijraset.2021.37955.
Full textAbdulrezzak, Sarah, and Firas Sabir. "An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers." Journal of Engineering 29, no. 2 (February 1, 2023): 164–78. http://dx.doi.org/10.31026/j.eng.2023.02.11.
Full textSingh, Ravi, and Virender Ranga. "Performance Evaluation of Machine Learning Classifiers on Internet of Things Security Dataset." International Journal of Control and Automation 11, no. 5 (May 31, 2018): 11–24. http://dx.doi.org/10.14257/ijca.2018.11.5.02.
Full textDeshmukh, Miss Maithili, and Dr M. A. Pund. "Review Paper on Network Data Verification Using Machine Learning Classifiers Based On Reduced Feature Dimensions." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1592–95. http://dx.doi.org/10.22214/ijraset.2022.41586.
Full textAlkaaf, Howida Abuabker, Aida Ali, Siti Mariyam Shamsuddin, and Shafaatunnur Hassan. "Exploring permissions in android applications using ensemble-based extra tree feature selection." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 1 (July 1, 2020): 543. http://dx.doi.org/10.11591/ijeecs.v19.i1.pp543-552.
Full textS.R., Chandrasekaran, and Dr Sabiyath Fatima N. "Speculating the Threat of Cardiovascular Disease Using Classifiers with User-Focused Security Evaluations." Webology 19, no. 1 (January 20, 2022): 5529–46. http://dx.doi.org/10.14704/web/v19i1/web19372.
Full textSharma, Shweta. "OVERVIEW OF MACHINE LEARNING IN CYBERSECURITY COMPARATIVE ANALYSIS OF CLASSIFIERS USING WEKA." Journal of University of Shanghai for Science and Technology 23, no. 08 (August 11, 2021): 334–43. http://dx.doi.org/10.51201/jusst/21/08385.
Full textK, Poojitha. "Detection of Malware in Android Phones Using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3344–47. http://dx.doi.org/10.22214/ijraset.2022.45726.
Full textKhonde, Shraddha R., and Venugopal Ulagamuthalvi. "Hybrid Architecture for Distributed Intrusion Detection System Using Semi-supervised Classifiers in Ensemble Approach." Advances in Modelling and Analysis B 63, no. 1-4 (December 31, 2020): 10–19. http://dx.doi.org/10.18280/ama_b.631-403.
Full textShibaikin, Sergei, Vladimir Nikulin, and Andrei Abbakumov. "Analysis of machine learning methods for computer systems to ensure safety from fraudulent texts." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 1 (January 27, 2020): 29–40. http://dx.doi.org/10.24143/2072-9502-2020-1-29-40.
Full textMahfouz, Ahmed, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva. "Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset." Future Internet 12, no. 11 (October 26, 2020): 180. http://dx.doi.org/10.3390/fi12110180.
Full textChinguwo, Michael Richard, and R. Dhanalakshmi. "Detecting Cloud Based Phishing Attacks Using Stacking Ensemble Machine Learning Technique." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (March 31, 2023): 360–67. http://dx.doi.org/10.22214/ijraset.2023.49422.
Full textAlothman, Zainab, Mouhammd Alkasassbeh, and Sherenaz Al-Haj Baddar. "An efficient approach to detect IoT botnet attacks using machine learning." Journal of High Speed Networks 26, no. 3 (November 27, 2020): 241–54. http://dx.doi.org/10.3233/jhs-200641.
Full textPise, Nitin. "APPLICATION OF MACHINE LEARNING FOR INTRUSION DETECTION SYSTEM." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 1, 2021): 314–23. http://dx.doi.org/10.17762/itii.v9i1.134.
Full textAbid, Adnan, Ansar Abbas, Adel Khelifi, Muhammad Shoaib Farooq, Razi Iqbal, and Uzma Farooq. "An architectural framework for information integration using machine learning approaches for smart city security profiling." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772096547. http://dx.doi.org/10.1177/1550147720965473.
Full textShroff, Jugal, Rahee Walambe, Sunil Kumar Singh, and Ketan Kotecha. "Enhanced Security Against Volumetric DDoS Attacks Using Adversarial Machine Learning." Wireless Communications and Mobile Computing 2022 (March 11, 2022): 1–10. http://dx.doi.org/10.1155/2022/5757164.
Full textKhan, Rijwan, Akhilesh Kumar Srivastava, Mahima Gupta, Pallavi Kumari, and Santosh Kumar. "Medicolite-Machine Learning-Based Patient Care Model." Computational Intelligence and Neuroscience 2022 (January 25, 2022): 1–12. http://dx.doi.org/10.1155/2022/8109147.
Full textLee, Ting Rong, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, and Jiageng Chen. "Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes." IEEE Access 9 (2021): 134052–64. http://dx.doi.org/10.1109/access.2021.3116468.
Full textAdithya Nallamuthu, Suresh. "A Hybrid Genetic-Neuro Algorithm for Cloud Intrusion Detection System." Journal of Computational Science and Intelligent Technologies 1, no. 2 (2020): 15–25. http://dx.doi.org/10.53409/mnaa.jcsit20201203.
Full textAljably, Randa, Yuan Tian, and Mznah Al-Rodhaan. "Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection." Security and Communication Networks 2020 (July 20, 2020): 1–14. http://dx.doi.org/10.1155/2020/5874935.
Full textAl-Zewairi, Malek, Sufyan Almajali, and Moussa Ayyash. "Unknown Security Attack Detection Using Shallow and Deep ANN Classifiers." Electronics 9, no. 12 (November 26, 2020): 2006. http://dx.doi.org/10.3390/electronics9122006.
Full textAl-Akhras, Mousa, Mohammed Alawairdhi, Ali Alkoudari, and Samer Atawneh. "Using Machine Learning to Build a Classification Model for IoT Networks to Detect Attack Signatures." International journal of Computer Networks & Communications 12, no. 6 (November 30, 2020): 99–116. http://dx.doi.org/10.5121/ijcnc.2020.12607.
Full textShatnawi, Ahmed S., Aya Jaradat, Tuqa Bani Yaseen, Eyad Taqieddin, Mahmoud Al-Ayyoub, and Dheya Mustafa. "An Android Malware Detection Leveraging Machine Learning." Wireless Communications and Mobile Computing 2022 (May 6, 2022): 1–12. http://dx.doi.org/10.1155/2022/1830201.
Full textJaradat, Ameera S., Malek M. Barhoush, and Rawan S. Bani Easa. "Network intrusion detection system: machine learning approach." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 2 (February 1, 2022): 1151. http://dx.doi.org/10.11591/ijeecs.v25.i2.pp1151-1158.
Full textKhan, Riaz Ullah, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz, and Mamoun Alazab. "An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers." Applied Sciences 9, no. 11 (June 11, 2019): 2375. http://dx.doi.org/10.3390/app9112375.
Full textAbed, Abdullah Suhail, Brwa Khalil Abdullah Ahmed, Sura Khalil Ibrahim, Musaddak Maher Abdul Zahra, Mohanad Ahmed Salih, and Refed Adnan Jaleel. "Development of an Integrate E-Medical System Using Software Defined Networking and Machine Learning." Webology 19, no. 1 (January 20, 2022): 3410–18. http://dx.doi.org/10.14704/web/v19i1/web19224.
Full textAlsulaiman, Lama, and Saad Al-Ahmadi. "Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network." International Journal of Network Security & Its Applications 13, no. 2 (March 31, 2021): 21–29. http://dx.doi.org/10.5121/ijnsa.2021.13202.
Full textKanaker, Hasan, Nader Abdel Karim, Samer A.B. Awwad, Nurul H.A. Ismail, Jamal Zraqou, and Abdulla M. F. Al ali. "Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 24 (December 20, 2022): 81–106. http://dx.doi.org/10.3991/ijim.v16i24.35763.
Full textGbenga*, Fadare Oluwaseun, Prof Adetunmbi Adebayo Olusola, Dr (Mrs) Oyinloye Oghenerukevwe Eloho, and Dr Mogaji Stephen Alaba. "Towards Optimization of Malware Detection using Chi-square Feature Selection on Ensemble Classifiers." International Journal of Engineering and Advanced Technology 10, no. 4 (April 30, 2021): 254–62. http://dx.doi.org/10.35940/ijeat.d2359.0410421.
Full textHammad, Baraa Tareq, Norziana Jamil, Ismail Taha Ahmed, Zuhaira Muhammad Zain, and Shakila Basheer. "Robust Malware Family Classification Using Effective Features and Classifiers." Applied Sciences 12, no. 15 (August 5, 2022): 7877. http://dx.doi.org/10.3390/app12157877.
Full textNigus, Mersha, and H. L. Shashirekha. "A Comparison of Machine Learning and Deep Learning Models for Predicting Household Food Security Status." International Journal of Electrical and Electronics Research 10, no. 2 (June 30, 2022): 308–11. http://dx.doi.org/10.37391/ijeer.100241.
Full textBangira, Tsitsi, Silvia Maria Alfieri, Massimo Menenti, and Adriaan van Niekerk. "Comparing Thresholding with Machine Learning Classifiers for Mapping Complex Water." Remote Sensing 11, no. 11 (June 5, 2019): 1351. http://dx.doi.org/10.3390/rs11111351.
Full textAlmaiah, Mohammed Amin, Omar Almomani, Adeeb Alsaaidah, Shaha Al-Otaibi, Nabeel Bani-Hani, Ahmad K. Al Hwaitat, Ali Al-Zahrani, Abdalwali Lutfi, Ali Bani Awad, and Theyazn H. H. Aldhyani. "Performance Investigation of Principal Component Analysis for Intrusion Detection System Using Different Support Vector Machine Kernels." Electronics 11, no. 21 (November 1, 2022): 3571. http://dx.doi.org/10.3390/electronics11213571.
Full textThabtah, Fadi, and Firuz Kamalov. "Phishing Detection: A Case Analysis on Classifiers with Rules Using Machine Learning." Journal of Information & Knowledge Management 16, no. 04 (November 23, 2017): 1750034. http://dx.doi.org/10.1142/s0219649217500344.
Full textAzeez, Nureni Ayofe, Oluwanifise Ebunoluwa Odufuwa, Sanjay Misra, Jonathan Oluranti, and Robertas Damaševičius. "Windows PE Malware Detection Using Ensemble Learning." Informatics 8, no. 1 (February 10, 2021): 10. http://dx.doi.org/10.3390/informatics8010010.
Full textGuo, You, Hector Marco-Gisbert, and Paul Keir. "Mitigating Webshell Attacks through Machine Learning Techniques." Future Internet 12, no. 1 (January 14, 2020): 12. http://dx.doi.org/10.3390/fi12010012.
Full textGumaste, Shweta, Narayan D. G., Sumedha Shinde, and Amit K. "Detection of DDoS Attacks in OpenStack-based Private Cloud Using Apache Spark." Journal of Telecommunications and Information Technology 4 (December 30, 2020): 62–71. http://dx.doi.org/10.26636/jtit.2020.146120.
Full textBagui, Sikha, Dustin Mink, Subhash Bagui, Tirthankar Ghosh, Tom McElroy, Esteban Paredes, Nithisha Khasnavis, and Russell Plenkers. "Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark’s Machine Learning in the Big Data Framework." Sensors 22, no. 20 (October 20, 2022): 7999. http://dx.doi.org/10.3390/s22207999.
Full textEssa, Hasanain Ali Al, and Wesam S. Bhaya. "Network Attacks Detection Depend on Majority Voting – Weighted Average for Feature Selection and Various Machine Learning Approaches." Webology 19, no. 1 (January 20, 2022): 2054–66. http://dx.doi.org/10.14704/web/v19i1/web19139.
Full textYang, Hao, Qin He, Zhenyan Liu, and Qian Zhang. "Malicious Encryption Traffic Detection Based on NLP." Security and Communication Networks 2021 (August 3, 2021): 1–10. http://dx.doi.org/10.1155/2021/9960822.
Full textCho, Jaeik, Seonghyeon Gong, and Ken Choi. "A Study on High-Speed Outlier Detection Method of Network Abnormal Behavior Data Using Heterogeneous Multiple Classifiers." Applied Sciences 12, no. 3 (January 19, 2022): 1011. http://dx.doi.org/10.3390/app12031011.
Full textAslam, Muhammad, Dengpan Ye, Aqil Tariq, Muhammad Asad, Muhammad Hanif, David Ndzi, Samia Allaoua Chelloug, Mohamed Abd Elaziz, Mohammed A. A. Al-Qaness, and Syeda Fizzah Jilani. "Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT." Sensors 22, no. 7 (March 31, 2022): 2697. http://dx.doi.org/10.3390/s22072697.
Full textHicham, Benradi, Chater Ahmed, and Lasfar Abdelali. "Face recognition method combining SVM machine learning and scale invariant feature transform." E3S Web of Conferences 351 (2022): 01033. http://dx.doi.org/10.1051/e3sconf/202235101033.
Full text