-
21
Effectiveness Evaluation of Random Forest, Naive Bayes, and Support Vector Machine Models for KDDCUP99 Anomaly Detection Based on K-means Clustering
Published 2025-01-01“…Naïve Bayes (NB). and Support Vector Machine (SVM) with the goal to boost the accuracy of predicting network intrusions. In tins paper. K-means clustering technique is applied as a preprocessing step to enhance the overall quality of network intrusion detection and maximize the accuracy of the network security measures. …”
Get full text
Article -
22
A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments
Published 2015-01-01“…Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling’s T2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. …”
Get full text
Article -
23
Network Packet Sniffer: A Case Study of Kabale University.
Published 2024“…Thus, it plays a crucial and essential role in dealing with network intrusion detection and unwanted traffic control. …”
Get full text
Thesis -
24
An intrusion detection model based on Convolutional Kolmogorov-Arnold Networks
Published 2025-01-01Get full text
Article -
25
Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models
Published 2021-01-01“…Two datasets are used to classify the IDS attack type, including wireless sensor network detection system (WSN-DS) and KDD Cup network intrusion dataset. A detailed comparison of the eight techniques’ performance using all features and selected features is made by measuring the accuracy, precision, recall, and F1-score. …”
Get full text
Article -
26
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
Published 2025-01-01“…Numerous research works were keen to project intelligent network intrusion detection systems (NIDS) to avert the exploitation of IoT data through smart applications. …”
Get full text
Article -
27
An Evaluation of Variational Autoencoder in Credit Card Anomaly Detection
Published 2024-09-01“…The anomaly can occur in many forms, such as fraudulent credit card transactions, network intrusions, and anomalous imageries or documents. …”
Get full text
Article