Статті в журналах з теми "Security of machine learning classifiers"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security of machine learning classifiers".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Atnafu, Surafel Mehari, and Prof (Dr ). Anuja Kumar Acharya. "Comparative Analysis of Intrusion Detection Attack Based on Machine Learning Classifiers." Indian Journal of Artificial Intelligence and Neural Networking 1, no. 2 (April 10, 2021): 22–28. http://dx.doi.org/10.35940/ijainn.b1025.041221.
Повний текст джерелаAtnafu, Surafel Mehari, and Prof (Dr ). Anuja Kumar Acharya. "Comparative Analysis of Intrusion Detection Attack Based on Machine Learning Classifiers." Indian Journal of Artificial Intelligence and Neural Networking 1, no. 2 (April 10, 2021): 22–28. http://dx.doi.org/10.54105/ijainn.b1025.041221.
Повний текст джерелаALGorain, Fahad T., and John A. Clark. "Covering Arrays ML HPO for Static Malware Detection." Eng 4, no. 1 (February 9, 2023): 543–54. http://dx.doi.org/10.3390/eng4010032.
Повний текст джерелаKatzir, Ziv, and Yuval Elovici. "Quantifying the resilience of machine learning classifiers used for cyber security." Expert Systems with Applications 92 (February 2018): 419–29. http://dx.doi.org/10.1016/j.eswa.2017.09.053.
Повний текст джерелаGongada, Sandhya Rani, Muktevi Chakravarthy, and Bhukya Mangu. "Power system contingency classification using machine learning technique." Bulletin of Electrical Engineering and Informatics 11, no. 6 (December 1, 2022): 3091–98. http://dx.doi.org/10.11591/eei.v11i6.4031.
Повний текст джерелаMehanović, Dželila, and Jasmin Kevrić. "Phishing Website Detection Using Machine Learning Classifiers Optimized by Feature Selection." Traitement du Signal 37, no. 4 (October 10, 2020): 563–69. http://dx.doi.org/10.18280/ts.370403.
Повний текст джерелаDeshmukh, Miss Maithili, and Dr M. A. Pund. "Implementation Paper on Network Data Verification Using Machine Learning Classifiers Based on Reduced Feature Dimensions." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2921–24. http://dx.doi.org/10.22214/ijraset.2022.41938.
Повний текст джерелаRunwal, Akshat. "Anomaly based Intrusion Detection System using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 255–60. http://dx.doi.org/10.22214/ijraset.2021.37955.
Повний текст джерелаAbdulrezzak, Sarah, and Firas Sabir. "An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers." Journal of Engineering 29, no. 2 (February 1, 2023): 164–78. http://dx.doi.org/10.31026/j.eng.2023.02.11.
Повний текст джерелаSingh, Ravi, and Virender Ranga. "Performance Evaluation of Machine Learning Classifiers on Internet of Things Security Dataset." International Journal of Control and Automation 11, no. 5 (May 31, 2018): 11–24. http://dx.doi.org/10.14257/ijca.2018.11.5.02.
Повний текст джерелаDeshmukh, Miss Maithili, and Dr M. A. Pund. "Review Paper on Network Data Verification Using Machine Learning Classifiers Based On Reduced Feature Dimensions." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1592–95. http://dx.doi.org/10.22214/ijraset.2022.41586.
Повний текст джерелаAlkaaf, Howida Abuabker, Aida Ali, Siti Mariyam Shamsuddin, and Shafaatunnur Hassan. "Exploring permissions in android applications using ensemble-based extra tree feature selection." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 1 (July 1, 2020): 543. http://dx.doi.org/10.11591/ijeecs.v19.i1.pp543-552.
Повний текст джерелаS.R., Chandrasekaran, and Dr Sabiyath Fatima N. "Speculating the Threat of Cardiovascular Disease Using Classifiers with User-Focused Security Evaluations." Webology 19, no. 1 (January 20, 2022): 5529–46. http://dx.doi.org/10.14704/web/v19i1/web19372.
Повний текст джерелаSharma, Shweta. "OVERVIEW OF MACHINE LEARNING IN CYBERSECURITY COMPARATIVE ANALYSIS OF CLASSIFIERS USING WEKA." Journal of University of Shanghai for Science and Technology 23, no. 08 (August 11, 2021): 334–43. http://dx.doi.org/10.51201/jusst/21/08385.
Повний текст джерелаK, Poojitha. "Detection of Malware in Android Phones Using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3344–47. http://dx.doi.org/10.22214/ijraset.2022.45726.
Повний текст джерелаKhonde, Shraddha R., and Venugopal Ulagamuthalvi. "Hybrid Architecture for Distributed Intrusion Detection System Using Semi-supervised Classifiers in Ensemble Approach." Advances in Modelling and Analysis B 63, no. 1-4 (December 31, 2020): 10–19. http://dx.doi.org/10.18280/ama_b.631-403.
Повний текст джерелаShibaikin, Sergei, Vladimir Nikulin, and Andrei Abbakumov. "Analysis of machine learning methods for computer systems to ensure safety from fraudulent texts." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 1 (January 27, 2020): 29–40. http://dx.doi.org/10.24143/2072-9502-2020-1-29-40.
Повний текст джерелаMahfouz, Ahmed, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva. "Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset." Future Internet 12, no. 11 (October 26, 2020): 180. http://dx.doi.org/10.3390/fi12110180.
Повний текст джерелаChinguwo, Michael Richard, and R. Dhanalakshmi. "Detecting Cloud Based Phishing Attacks Using Stacking Ensemble Machine Learning Technique." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (March 31, 2023): 360–67. http://dx.doi.org/10.22214/ijraset.2023.49422.
Повний текст джерелаAlothman, Zainab, Mouhammd Alkasassbeh, and Sherenaz Al-Haj Baddar. "An efficient approach to detect IoT botnet attacks using machine learning." Journal of High Speed Networks 26, no. 3 (November 27, 2020): 241–54. http://dx.doi.org/10.3233/jhs-200641.
Повний текст джерелаPise, Nitin. "APPLICATION OF MACHINE LEARNING FOR INTRUSION DETECTION SYSTEM." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 1, 2021): 314–23. http://dx.doi.org/10.17762/itii.v9i1.134.
Повний текст джерелаAbid, Adnan, Ansar Abbas, Adel Khelifi, Muhammad Shoaib Farooq, Razi Iqbal, and Uzma Farooq. "An architectural framework for information integration using machine learning approaches for smart city security profiling." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772096547. http://dx.doi.org/10.1177/1550147720965473.
Повний текст джерелаShroff, Jugal, Rahee Walambe, Sunil Kumar Singh, and Ketan Kotecha. "Enhanced Security Against Volumetric DDoS Attacks Using Adversarial Machine Learning." Wireless Communications and Mobile Computing 2022 (March 11, 2022): 1–10. http://dx.doi.org/10.1155/2022/5757164.
Повний текст джерелаKhan, Rijwan, Akhilesh Kumar Srivastava, Mahima Gupta, Pallavi Kumari, and Santosh Kumar. "Medicolite-Machine Learning-Based Patient Care Model." Computational Intelligence and Neuroscience 2022 (January 25, 2022): 1–12. http://dx.doi.org/10.1155/2022/8109147.
Повний текст джерелаLee, Ting Rong, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, and Jiageng Chen. "Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes." IEEE Access 9 (2021): 134052–64. http://dx.doi.org/10.1109/access.2021.3116468.
Повний текст джерелаAdithya Nallamuthu, Suresh. "A Hybrid Genetic-Neuro Algorithm for Cloud Intrusion Detection System." Journal of Computational Science and Intelligent Technologies 1, no. 2 (2020): 15–25. http://dx.doi.org/10.53409/mnaa.jcsit20201203.
Повний текст джерелаAljably, Randa, Yuan Tian, and Mznah Al-Rodhaan. "Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection." Security and Communication Networks 2020 (July 20, 2020): 1–14. http://dx.doi.org/10.1155/2020/5874935.
Повний текст джерелаAl-Zewairi, Malek, Sufyan Almajali, and Moussa Ayyash. "Unknown Security Attack Detection Using Shallow and Deep ANN Classifiers." Electronics 9, no. 12 (November 26, 2020): 2006. http://dx.doi.org/10.3390/electronics9122006.
Повний текст джерелаAl-Akhras, Mousa, Mohammed Alawairdhi, Ali Alkoudari, and Samer Atawneh. "Using Machine Learning to Build a Classification Model for IoT Networks to Detect Attack Signatures." International journal of Computer Networks & Communications 12, no. 6 (November 30, 2020): 99–116. http://dx.doi.org/10.5121/ijcnc.2020.12607.
Повний текст джерелаShatnawi, Ahmed S., Aya Jaradat, Tuqa Bani Yaseen, Eyad Taqieddin, Mahmoud Al-Ayyoub, and Dheya Mustafa. "An Android Malware Detection Leveraging Machine Learning." Wireless Communications and Mobile Computing 2022 (May 6, 2022): 1–12. http://dx.doi.org/10.1155/2022/1830201.
Повний текст джерелаJaradat, Ameera S., Malek M. Barhoush, and Rawan S. Bani Easa. "Network intrusion detection system: machine learning approach." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 2 (February 1, 2022): 1151. http://dx.doi.org/10.11591/ijeecs.v25.i2.pp1151-1158.
Повний текст джерелаKhan, Riaz Ullah, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz, and Mamoun Alazab. "An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers." Applied Sciences 9, no. 11 (June 11, 2019): 2375. http://dx.doi.org/10.3390/app9112375.
Повний текст джерелаAbed, Abdullah Suhail, Brwa Khalil Abdullah Ahmed, Sura Khalil Ibrahim, Musaddak Maher Abdul Zahra, Mohanad Ahmed Salih, and Refed Adnan Jaleel. "Development of an Integrate E-Medical System Using Software Defined Networking and Machine Learning." Webology 19, no. 1 (January 20, 2022): 3410–18. http://dx.doi.org/10.14704/web/v19i1/web19224.
Повний текст джерелаAlsulaiman, Lama, and Saad Al-Ahmadi. "Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network." International Journal of Network Security & Its Applications 13, no. 2 (March 31, 2021): 21–29. http://dx.doi.org/10.5121/ijnsa.2021.13202.
Повний текст джерелаKanaker, Hasan, Nader Abdel Karim, Samer A.B. Awwad, Nurul H.A. Ismail, Jamal Zraqou, and Abdulla M. F. Al ali. "Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 24 (December 20, 2022): 81–106. http://dx.doi.org/10.3991/ijim.v16i24.35763.
Повний текст джерелаGbenga*, Fadare Oluwaseun, Prof Adetunmbi Adebayo Olusola, Dr (Mrs) Oyinloye Oghenerukevwe Eloho, and Dr Mogaji Stephen Alaba. "Towards Optimization of Malware Detection using Chi-square Feature Selection on Ensemble Classifiers." International Journal of Engineering and Advanced Technology 10, no. 4 (April 30, 2021): 254–62. http://dx.doi.org/10.35940/ijeat.d2359.0410421.
Повний текст джерелаHammad, Baraa Tareq, Norziana Jamil, Ismail Taha Ahmed, Zuhaira Muhammad Zain, and Shakila Basheer. "Robust Malware Family Classification Using Effective Features and Classifiers." Applied Sciences 12, no. 15 (August 5, 2022): 7877. http://dx.doi.org/10.3390/app12157877.
Повний текст джерелаNigus, Mersha, and H. L. Shashirekha. "A Comparison of Machine Learning and Deep Learning Models for Predicting Household Food Security Status." International Journal of Electrical and Electronics Research 10, no. 2 (June 30, 2022): 308–11. http://dx.doi.org/10.37391/ijeer.100241.
Повний текст джерелаBangira, Tsitsi, Silvia Maria Alfieri, Massimo Menenti, and Adriaan van Niekerk. "Comparing Thresholding with Machine Learning Classifiers for Mapping Complex Water." Remote Sensing 11, no. 11 (June 5, 2019): 1351. http://dx.doi.org/10.3390/rs11111351.
Повний текст джерелаAlmaiah, Mohammed Amin, Omar Almomani, Adeeb Alsaaidah, Shaha Al-Otaibi, Nabeel Bani-Hani, Ahmad K. Al Hwaitat, Ali Al-Zahrani, Abdalwali Lutfi, Ali Bani Awad, and Theyazn H. H. Aldhyani. "Performance Investigation of Principal Component Analysis for Intrusion Detection System Using Different Support Vector Machine Kernels." Electronics 11, no. 21 (November 1, 2022): 3571. http://dx.doi.org/10.3390/electronics11213571.
Повний текст джерелаThabtah, Fadi, and Firuz Kamalov. "Phishing Detection: A Case Analysis on Classifiers with Rules Using Machine Learning." Journal of Information & Knowledge Management 16, no. 04 (November 23, 2017): 1750034. http://dx.doi.org/10.1142/s0219649217500344.
Повний текст джерелаAzeez, Nureni Ayofe, Oluwanifise Ebunoluwa Odufuwa, Sanjay Misra, Jonathan Oluranti, and Robertas Damaševičius. "Windows PE Malware Detection Using Ensemble Learning." Informatics 8, no. 1 (February 10, 2021): 10. http://dx.doi.org/10.3390/informatics8010010.
Повний текст джерелаGuo, You, Hector Marco-Gisbert, and Paul Keir. "Mitigating Webshell Attacks through Machine Learning Techniques." Future Internet 12, no. 1 (January 14, 2020): 12. http://dx.doi.org/10.3390/fi12010012.
Повний текст джерелаGumaste, Shweta, Narayan D. G., Sumedha Shinde, and Amit K. "Detection of DDoS Attacks in OpenStack-based Private Cloud Using Apache Spark." Journal of Telecommunications and Information Technology 4 (December 30, 2020): 62–71. http://dx.doi.org/10.26636/jtit.2020.146120.
Повний текст джерелаBagui, Sikha, Dustin Mink, Subhash Bagui, Tirthankar Ghosh, Tom McElroy, Esteban Paredes, Nithisha Khasnavis, and Russell Plenkers. "Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark’s Machine Learning in the Big Data Framework." Sensors 22, no. 20 (October 20, 2022): 7999. http://dx.doi.org/10.3390/s22207999.
Повний текст джерелаEssa, Hasanain Ali Al, and Wesam S. Bhaya. "Network Attacks Detection Depend on Majority Voting – Weighted Average for Feature Selection and Various Machine Learning Approaches." Webology 19, no. 1 (January 20, 2022): 2054–66. http://dx.doi.org/10.14704/web/v19i1/web19139.
Повний текст джерелаYang, Hao, Qin He, Zhenyan Liu, and Qian Zhang. "Malicious Encryption Traffic Detection Based on NLP." Security and Communication Networks 2021 (August 3, 2021): 1–10. http://dx.doi.org/10.1155/2021/9960822.
Повний текст джерелаCho, Jaeik, Seonghyeon Gong, and Ken Choi. "A Study on High-Speed Outlier Detection Method of Network Abnormal Behavior Data Using Heterogeneous Multiple Classifiers." Applied Sciences 12, no. 3 (January 19, 2022): 1011. http://dx.doi.org/10.3390/app12031011.
Повний текст джерелаAslam, Muhammad, Dengpan Ye, Aqil Tariq, Muhammad Asad, Muhammad Hanif, David Ndzi, Samia Allaoua Chelloug, Mohamed Abd Elaziz, Mohammed A. A. Al-Qaness, and Syeda Fizzah Jilani. "Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT." Sensors 22, no. 7 (March 31, 2022): 2697. http://dx.doi.org/10.3390/s22072697.
Повний текст джерелаHicham, Benradi, Chater Ahmed, and Lasfar Abdelali. "Face recognition method combining SVM machine learning and scale invariant feature transform." E3S Web of Conferences 351 (2022): 01033. http://dx.doi.org/10.1051/e3sconf/202235101033.
Повний текст джерела