-
1
Effects of feature selection and normalization on network intrusion detection
Published 2025-03-01Get full text
Article -
2
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01“…In the digital age, the increasing demand for network security has driven research on efficient network intrusion detection systems. The effectiveness of traditional network intrusion is limited in the face of complex network attacks and constantly increasing data volume. …”
Get full text
Article -
3
Semi-supervised tri-Adaboost algorithm for network intrusion detection
Published 2019-06-01“…Network intrusion detection is a relatively mature research topic, but one that remains challenging particular as technologies and threat landscape evolve. …”
Get full text
Article -
4
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
Published 2020-01-01“…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. …”
Get full text
Article -
5
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection
Published 2024-12-01Subjects: Get full text
Article -
6
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
Published 2013-03-01Get full text
Article -
7
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Published 2024-01-01“…Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. …”
Get full text
Article -
8
Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement
Published 2025-01-01Get full text
Article -
9
Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement.
Published 2025-01-01“…The network intrusion detection system (NIDS) plays a critical role in maintaining network security. …”
Get full text
Article -
10
Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model
Published 2024-01-01“…Network intrusion detection systems play a critical role in protecting a variety of services ranging from economic through social to commerce. …”
Get full text
Article -
11
ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Published 2025-01-01Subjects: “…network intrusion detection…”
Get full text
Article -
12
Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations
Published 2025-01-01Subjects: Get full text
Article -
13
Network Anomaly Detection Using Quantum Neural Networks on Noisy Quantum Computers
Published 2024-01-01Subjects: Get full text
Article -
14
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01“…Abstract Most of the data, which is in the field of network intrusion detection, have the characteristics of a mixture of high‐dimensional datasets of continuous and categorical variables. …”
Get full text
Article -
15
AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM
Published 2019-06-01“…Network intrusion detection is one of the most important issues of network security and is a research interest of many researchers. …”
Get full text
Article -
16
SVM Intrusion Detection Model Based on Compressed Sampling
Published 2016-01-01“…Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data. …”
Get full text
Article -
17
Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis
Published 2025-01-01“…In this paper, PCAP refers to Packet Capture, Network Intrusion Detection Systems refers to NIDS, Artificial Intelligence refers to AI, machine learning refers to ML, Computer Vision refers to CV, and Natural Language Processing refers to NLP. …”
Get full text
Article -
18
Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
Published 2024-02-01“…Like any computer network, it faces its own challenges and problems, one of which is the issue of network intrusion and disruption. This dissertation focuses on detecting anomaly-based intrusion into the Internet of Things using data mining. …”
Get full text
Article -
19
Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks
Published 2025-02-01“…A novel ensemble of deep learning technique is proposed to enhance the efficiency of Packet Flow Classification in Network Intrusion Detection System (NIDS). The proposed work consists of three phases: (i) Feature Augmented Convolutional Neural Network (FA-CNN) (ii) Deep Autoencoder (iii) Ensemble of FA-CNN and Deep Autoencoder. …”
Get full text
Article -
20
A Comparative Analysis of Support Vector Machine and K-Nearest Neighbors Models for Network Attack Traffic Detection
Published 2025-01-01“…Moreover, the research highlights future directions to strengthen the resilience and precision of network intrusion detection systems, ensuring the development of more effective defenses against the ever-evolving landscape of cybersecurity risks.…”
Get full text
Article