Chaithanya et al., 2020 - Google Patents
An efficient intrusion detection approach using enhanced random forest and moth-flame optimization techniqueChaithanya et al., 2020
- Document ID
- 1616424777075576352
- Author
- Chaithanya P
- Gauthama Raman M
- Nivethitha S
- Seshan K
- Sriram V
- Publication year
- Publication venue
- Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2019
External Links
Snippet
The recent advancements in the computer networks pave a sophisticated platform to the “Black hat” attackers, which poses a major challenge to network security. Intrusion detection is a significant research problem in network security which motivates the researchers to …
- 238000001514 detection method 0 title abstract description 40
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sahani et al. | Classification of intrusion detection using data mining techniques | |
Kumar et al. | A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks | |
Rashid et al. | A tree-based stacking ensemble technique with feature selection for network intrusion detection | |
Aksu et al. | Intrusion detection with comparative analysis of supervised learning techniques and fisher score feature selection algorithm | |
Meryem et al. | Hybrid intrusion detection system using machine learning | |
Talukder et al. | Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction | |
Zahoora et al. | Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier | |
Abdelkhalek et al. | Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning | |
Seth et al. | A novel time efficient learning-based approach for smart intrusion detection system | |
Pérez et al. | Comparison of network intrusion detection performance using feature representation | |
Sharma et al. | An enhanced approach to fuzzy C-means clustering for anomaly detection | |
Gaikwad et al. | DAREnsemble: Decision tree and rule learner based ensemble for network intrusion detection system | |
Chaithanya et al. | An efficient intrusion detection approach using enhanced random forest and moth-flame optimization technique | |
El-Sofany et al. | Using machine learning algorithms to enhance IoT system security | |
Rabie et al. | A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models | |
Quinan et al. | Unsupervised anomaly detection using a new knowledge graph model for network activity and events | |
Prabhakaran et al. | mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system | |
Neha et al. | An improved feedforward neural network using salp swarm optimization technique for the design of intrusion detection system for computer network | |
Quintero-Bonilla et al. | Proposed models for advanced persistent threat detection: A review | |
Awujoola et al. | Wrapper based approach for network intrusion detection model with combination of dual filtering technique of resample and SMOTE | |
Tiwari et al. | A lightweight optimized intrusion detection system using machine learning for edge-based IIoT security | |
Pardhi et al. | Classification of malware from the network traffic using hybrid and deep learning based approach | |
Nandhini et al. | An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system | |
Thomas et al. | Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment | |
Lipsa et al. | A novel dimensionality reduction strategy based on linear regression with a fine-pruned decision tree classifier for detecting DDoS attacks in cloud computing environments |