Artículos de revistas sobre el tema "Light-based Intrusion classification system"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Light-based Intrusion classification system".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jecheva, Veselina y Evgeniya Nikolova. "Classification Trees as a Technique for Creating Anomaly-Based Intrusion Detection Systems". Serdica Journal of Computing 3, n.º 4 (11 de enero de 2010): 335–58. http://dx.doi.org/10.55630/sjc.2009.3.335-358.
Texto completoSandosh, S., Dr V. Govindasamy y Dr G. Akila. "Novel Pattern Matching based Alert Classification Approach For Intrusion Detection System". Journal of Advanced Research in Dynamical and Control Systems 11, n.º 11-SPECIAL ISSUE (29 de noviembre de 2019): 279–89. http://dx.doi.org/10.5373/jardcs/v11sp11/20193032.
Texto completoKamble, Arvind y Virendra S. Malemath. "Adam Improved Rider Optimization-Based Deep Recurrent Neural Network for the Intrusion Detection in Cyber Physical Systems". International Journal of Swarm Intelligence Research 13, n.º 3 (1 de julio de 2022): 1–22. http://dx.doi.org/10.4018/ijsir.304402.
Texto completoAhmad, Iftikhar, Qazi Emad Ul Haq, Muhammad Imran, Madini O. Alassafi y Rayed A. AlGhamdi. "An Efficient Network Intrusion Detection and Classification System". Mathematics 10, n.º 3 (8 de febrero de 2022): 530. http://dx.doi.org/10.3390/math10030530.
Texto completoMohammed, Bilal y Ekhlas K. Gbashi. "Intrusion Detection System for NSL-KDD Dataset Based on Deep Learning and Recursive Feature Elimination". Engineering and Technology Journal 39, n.º 7 (25 de julio de 2021): 1069–79. http://dx.doi.org/10.30684/etj.v39i7.1695.
Texto completoAli, Rashid y Supriya Kamthania. "A Comparative Study of Different Relevant Features Hybrid Neural Networks Based Intrusion Detection Systems". Advanced Materials Research 403-408 (noviembre de 2011): 4703–10. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4703.
Texto completoUgendhar, A., Babu Illuri, Sridhar Reddy Vulapula, Marepalli Radha, Sukanya K, Fayadh Alenezi, Sara A. Althubiti y Kemal Polat. "A Novel Intelligent-Based Intrusion Detection System Approach Using Deep Multilayer Classification". Mathematical Problems in Engineering 2022 (6 de mayo de 2022): 1–10. http://dx.doi.org/10.1155/2022/8030510.
Texto completoAfzal, Shehroz y Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas". STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, n.º 2 (31 de diciembre de 2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Texto completoAfzal, Shehroz y Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas". STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, n.º 2 (31 de diciembre de 2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.
Texto completoAlzahrani, Mohammed Saeed y Fawaz Waselallah Alsaade. "Computational Intelligence Approaches in Developing Cyberattack Detection System". Computational Intelligence and Neuroscience 2022 (18 de marzo de 2022): 1–16. http://dx.doi.org/10.1155/2022/4705325.
Texto completoMulyanto, Mulyanto, Muhamad Faisal, Setya Widyawan Prakosa y Jenq-Shiou Leu. "Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems". Symmetry 13, n.º 1 (22 de diciembre de 2020): 4. http://dx.doi.org/10.3390/sym13010004.
Texto completoWang, Li Fang. "Anomaly Intrusion Detection Based on Concept Lattice". Applied Mechanics and Materials 220-223 (noviembre de 2012): 2388–92. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2388.
Texto completoZhao, Xuemin. "Application of Data Mining Technology in Software Intrusion Detection and Information Processing". Wireless Communications and Mobile Computing 2022 (9 de junio de 2022): 1–8. http://dx.doi.org/10.1155/2022/3829160.
Texto completoKhattab M. Ali Alheeti, Ali Azawii Abdu Lateef, Abdulkareem Alzahrani, Azhar Imran y Duaa Al_Dosary. "Cloud Intrusion Detection System Based on SVM". International Journal of Interactive Mobile Technologies (iJIM) 17, n.º 11 (7 de junio de 2023): 101–14. http://dx.doi.org/10.3991/ijim.v17i11.39063.
Texto completoGanapathy, S., P. Yogesh y A. Kannan. "Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM". Computational Intelligence and Neuroscience 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/850259.
Texto completoAlwan, Karrar, Ahmed AbuEl-Atta y Hala Zayed. "Feature Selection Models Based on Hybrid Firefly Algorithm with Mutation Operator for Network Intrusion Detection". International Journal of Intelligent Engineering and Systems 14, n.º 1 (28 de febrero de 2021): 192–202. http://dx.doi.org/10.22266/ijies2021.0228.19.
Texto completoLaxkar, Pradeep y Prasun Chakrabarti. "Comparison of intrusion detection system based on feature extraction". International Journal of Engineering & Technology 7, n.º 3.3 (8 de junio de 2018): 536. http://dx.doi.org/10.14419/ijet.v7i2.33.14829.
Texto completoPreethi D. y Neelu Khare. "An Intelligent Network Intrusion Detection System Using Particle Swarm Optimization (PSO) and Deep Network Networks (DNN)". International Journal of Swarm Intelligence Research 12, n.º 2 (abril de 2021): 57–73. http://dx.doi.org/10.4018/ijsir.2021040104.
Texto completoWang, Qian, Wenfang Zhao y Jiadong Ren. "Intrusion detection algorithm based on image enhanced convolutional neural network". Journal of Intelligent & Fuzzy Systems 41, n.º 1 (11 de agosto de 2021): 2183–94. http://dx.doi.org/10.3233/jifs-210863.
Texto completoAlzubi, Omar A., Jafar A. Alzubi, Moutaz Alazab, Adnan Alrabea, Albara Awajan y Issa Qiqieh. "Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment". Electronics 11, n.º 19 (22 de septiembre de 2022): 3007. http://dx.doi.org/10.3390/electronics11193007.
Texto completoKumar, Kapil, Arvind Kumar, Vimal Kumar y Sunil Kumar. "A Hybrid Classification Technique for Enhancing the Effectiveness of Intrusion Detection Systems Using Machine Learning". International Journal of Organizational and Collective Intelligence 12, n.º 1 (enero de 2022): 1–18. http://dx.doi.org/10.4018/ijoci.2022010102.
Texto completoPamela Vinitha Eric, Mathiyalagan R,. "An Efficient Intrusion Detection System Using Improved Bias Based Convolutional Neural Network Classifier". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 6 (5 de abril de 2021): 2468–82. http://dx.doi.org/10.17762/turcomat.v12i6.5689.
Texto completoLee, JooHwa y KeeHyun Park. "AE-CGAN Model based High Performance Network Intrusion Detection System". Applied Sciences 9, n.º 20 (10 de octubre de 2019): 4221. http://dx.doi.org/10.3390/app9204221.
Texto completoImrana, Yakubu, Yanping Xiang, Liaqat Ali, Zaharawu Abdul-Rauf, Yu-Chen Hu, Seifedine Kadry y Sangsoon Lim. "χ2-BidLSTM: A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM". Sensors 22, n.º 5 (4 de marzo de 2022): 2018. http://dx.doi.org/10.3390/s22052018.
Texto completoHan, Jonghoo y Wooguil Pak. "Hierarchical LSTM-Based Network Intrusion Detection System Using Hybrid Classification". Applied Sciences 13, n.º 5 (27 de febrero de 2023): 3089. http://dx.doi.org/10.3390/app13053089.
Texto completoKumar, Yadala Prabhu y Burra Vijaya Babu. "Stabbing of Intrusion with Learning Framework Using Auto Encoder Based Intellectual Enhanced Linear Support Vector Machine for Feature Dimensionality Reduction". Revue d'Intelligence Artificielle 36, n.º 5 (23 de diciembre de 2022): 737–43. http://dx.doi.org/10.18280/ria.360511.
Texto completoPreethi D. y Neelu Khare. "EFS-LSTM (Ensemble-Based Feature Selection With LSTM) Classifier for Intrusion Detection System". International Journal of e-Collaboration 16, n.º 4 (octubre de 2020): 72–86. http://dx.doi.org/10.4018/ijec.2020100106.
Texto completoPriyadarsini, Pullagura Indira y G. Anuradha. "A novel ensemble modeling for intrusion detection system". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 2 (1 de abril de 2020): 1963. http://dx.doi.org/10.11591/ijece.v10i2.pp1963-1971.
Texto completoLodhi, Mala Bharti, Vineet Richhariya y Mahesh Parmar. "AN IMPLEMENTATION OF IDS IN A HYBRID APPROACH AND KDD CUP DATASET". International Journal of Research -GRANTHAALAYAH 2, n.º 3 (31 de diciembre de 2014): 1–9. http://dx.doi.org/10.29121/granthaalayah.v2.i3.2014.3055.
Texto completoYuhong Wu, Yuhong Wu y Xiangdong Hu Yuhong Wu. "AMS Intrusion Detection Method Based on Improved Generalized Regression Neural Network". 網際網路技術學刊 24, n.º 2 (marzo de 2023): 549–63. http://dx.doi.org/10.53106/160792642023032402029.
Texto completoKannan, Anand, Karthik Gururajan Venkatesan, Alexandra Stagkopoulou, Sheng Li, Sathyavakeeswaran Krishnan y Arifur Rahman. "A Novel Cloud Intrusion Detection System Using Feature Selection and Classification". International Journal of Intelligent Information Technologies 11, n.º 4 (octubre de 2015): 1–15. http://dx.doi.org/10.4018/ijiit.2015100101.
Texto completoAbdulameer, Hasan, Inam Musa y Noora Salim Al-Sultani. "Three level intrusion detection system based on conditional generative adversarial network". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 2 (1 de abril de 2023): 2240. http://dx.doi.org/10.11591/ijece.v13i2.pp2240-2258.
Texto completoVishwakarma, Uma, Prof Anurag Jain y Prof Akriti Jain. "A Review of Feature Reduction in Intrusion Detection System Based on Artificial Immune System and Neural Network". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, n.º 3 (15 de julio de 2013): 1127–33. http://dx.doi.org/10.24297/ijct.v9i3.3338.
Texto completoCai, Yu. "Mobile Agent Based Network Defense System in Enterprise Network". International Journal of Handheld Computing Research 2, n.º 1 (enero de 2011): 41–54. http://dx.doi.org/10.4018/jhcr.2011010103.
Texto completoGondal, Farzana Kausar. "Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review". Innovative Computing Review 1, n.º 2 (26 de diciembre de 2021): 85–102. http://dx.doi.org/10.32350/icr.0102.05.
Texto completoAbuadlla, Yousef, Omran Ben Taher y Hesham Elzentani. "Flow Based Intrusion Detection System Using Multistage Neural Network". مجلة الجامعة الأسمرية: العلوم التطبيقية 2, n.º 2 (30 de diciembre de 2017): 87–77. http://dx.doi.org/10.59743/aujas.v2i2.1158.
Texto completoWu, Yuhong y Xiangdong Hu. "An Intrusion Detection Method Based on Fully Connected Recurrent Neural Network". Scientific Programming 2022 (26 de septiembre de 2022): 1–11. http://dx.doi.org/10.1155/2022/7777211.
Texto completoPise, Nitin. "APPLICATION OF MACHINE LEARNING FOR INTRUSION DETECTION SYSTEM". INFORMATION TECHNOLOGY IN INDUSTRY 9, n.º 1 (1 de marzo de 2021): 314–23. http://dx.doi.org/10.17762/itii.v9i1.134.
Texto completoPietro Spadaccino y Francesca Cuomo. "Intrusion detection systems for IoT: Opportunities and challenges offered by edge computing". ITU Journal on Future and Evolving Technologies 3, n.º 2 (22 de septiembre de 2022): 408–20. http://dx.doi.org/10.52953/wnvi5792.
Texto completoTian, Yuyang. "Abnormal Traffic Prediction and Classification based on Information Big Data". Highlights in Science, Engineering and Technology 23 (3 de diciembre de 2022): 145–53. http://dx.doi.org/10.54097/hset.v23i.3216.
Texto completoAlmuhairi, Thani, Ahmad Almarri y Khalid Hokal. "An Artificial Intelligence-based Intrusion Detection System". Journal of Cybersecurity and Information Management 07, n.º 02 (1 de abril de 2021): 95–111. http://dx.doi.org/10.54216/jcim.07.02.04.
Texto completoDuhayyim, Mesfer Al, Khalid A. Alissa, Fatma S. Alrayes, Saud S. Alotaibi, ElSayed M. Tag El Din, Amgad Atta Abdelmageed, Ishfaq Yaseen y Abdelwahed Motwakel. "Evolutionary-Based Deep Stacked Autoencoder for Intrusion Detection in a Cloud-Based Cyber-Physical System". Applied Sciences 12, n.º 14 (7 de julio de 2022): 6875. http://dx.doi.org/10.3390/app12146875.
Texto completoAbdulrahman, Amer A. y Mahmood K. Ibrahem. "Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms". Iraqi Journal of Information & Communications Technology 1, n.º 3 (1 de febrero de 2019): 49–55. http://dx.doi.org/10.31987/ijict.1.3.40.
Texto completoJiang, Xue Song, Xiu Mei Wei y Yu Shui Geng. "The Research of Intrusion Detection System Based on ANN on Cloud Platform". Applied Mechanics and Materials 263-266 (diciembre de 2012): 2962–65. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2962.
Texto completoSampath, Nithya y Dinakaran M. "Flow Based Classification for Specification Based Intrusion Detection in Software Defined Networking". International Journal of Software Innovation 7, n.º 2 (abril de 2019): 1–8. http://dx.doi.org/10.4018/ijsi.2019040101.
Texto completoFarhana, Kaniz, Maqsudur Rahman y Md Tofael Ahmed. "An intrusion detection system for packet and flow based networks using deep neural network approach". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 5 (1 de octubre de 2020): 5514. http://dx.doi.org/10.11591/ijece.v10i5.pp5514-5525.
Texto completoZhou, Yulin, Lun Xie y Hang Pan. "Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms". Applied Sciences 12, n.º 6 (8 de marzo de 2022): 2765. http://dx.doi.org/10.3390/app12062765.
Texto completoLi, Wenchao, Ping Yi, Yue Wu, Li Pan y Jianhua Li. "A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network". Journal of Electrical and Computer Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/240217.
Texto completoHussien et al., Zaid. "Anomaly Detection Approach Based on Deep Neural Network and Dropout". Baghdad Science Journal 17, n.º 2(SI) (23 de junio de 2020): 0701. http://dx.doi.org/10.21123/bsj.2020.17.2(si).0701.
Texto completoProtić, Danijela. "Intrusion detection based on the artificial immune system". Vojnotehnicki glasnik 68, n.º 4 (2020): 790–803. http://dx.doi.org/10.5937/vojtehg68-27954.
Texto completo