Open Access
MATEC Web of Conferences
Volume 44, 2016
2016 International Conference on Electronic, Information and Computer Engineering
Article Number 02041
Number of page(s) 7
Section Electronics, Information and Engineering Application
Published online 08 March 2016
  1. H.J. Liao, C.H.R. Lin, Y.C. Lin, K.Y. Tung, Intrusion detection system: A comprehensive review, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 36, 1: 16–24 (2013). [CrossRef]
  2. M.S. Abadeh, J. Habibi, C. Lucas, Intrusion detection using a fuzzy genetics-based learning algorithm, Journal of Network and Computer Applications, 30, 1: 414–428 (2007) [CrossRef]
  3. A. Tajbakhsh, M. Rahmati, A. Mirzaei, Intrusion detection using fuzzy association rules, Applied Soft Computing Journal, 9, 2: 462–469 (2009) [CrossRef]
  4. Y.H. Liao, V.R. Vemuri, Use of k-nearest neighbor classifier for intrusion detection, COMPUTERS & SECURITY, 21, 5: 439–448 (2002). [CrossRef]
  5. M.-Y. Su, Real-time anomaly detection systems for denial-of-service attacks by weighted k-nearest-neighbor classifiers, Expert Systems With Applications, 38, 4: 3492–3498 (2011) [CrossRef]
  6. S. Mukkamala, A.H. Sung, A. Abraham, Intrusion detection using an ensemble of intelligent paradigms, Journal of Network and Computer Applications, 28, 2: 167–182 (2005) [CrossRef]
  7. S. Mukkamala, A.H. Sung, Feature ranking and selection for intrusion detection systems using support vector machines. In International conference on information and knowledge engineering (ICIKE). 503–509 (2002)
  8. D. Fisch, A. Hofmann, B. Sick, On the versatility of radial basis function neural networks: A case study in the field of intrusion detection, Information Sciences, 180, 12: 2421–2439 (2010) [CrossRef]
  9. Z.A. Baig, S.M. Sait, A. Shaheen, Gmdh-based networks for intelligent intrusion detection, ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 26, 7: 1731–1740 (2013) [CrossRef]
  10. S.S.S. Sindhu, S. Geetha, A. Kannan, Decision tree based light weight intrusion detection using a wrapper approach, EXPERT SYSTEMS WITH APPLICATIONS, 39, 1: 129–141 (2012) [CrossRef]
  11. A.S. Eesa, Z. Orman, A.M.A. Brifcani, A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems, EXPERT SYSTEMS WITH APPLICATIONS 42, 5: 2670–2679 (2015) [CrossRef]
  12. T. Shon, X. Kovah, J. Moon, Applying genetic algorithm for classifying anomalous tcp/ip packets, Neurocomputing, 69, 16: 2429–2433 (2006) [CrossRef]
  13. D. lppoliti, X.B. Zhou, A-ghsom: An adaptive growing hierarchical self organizing map for network anomaly detection, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 72, 12: 1576–1590 (2012) [CrossRef]
  14. N. Ye, Y. Zhang, C.M. Borror, Robustness of the markov-chain model for cyber-attack detection, IEEE Transactions on Reliability, 53, 1: 116–123 (2004) [CrossRef]
  15. S. Shin, S. Lee, H. Kim, S. Kim, Advanced probabilistic approach for network intrusion forecasting and detection, EXPERT SYSTEMS WITH APPLICATIONS, 40, 1: 315–322 (2013) [CrossRef]
  16. T. Shon, J. Moon, A hybrid machine learning approach to network anomaly detection, Information Sciences, 177, 18: 3799–3821 (2007) [CrossRef]
  17. R.M. Elbasiony, E.A. Sallam, T.E. Eltobely, M.M. Fahmy, A hybrid network intrusion detection framework based on random forests and weighted k-means, Ain Shams Engineering Journal, 4, 4: 753–762 (2013) [CrossRef]
  18. G. Liu, Z. Yi, S. Yang, A hierarchical intrusion detection model based on the pca neural networks, Neurocomputing, 70, 7: 1561–1568 (2007) [CrossRef]
  19. Significant feature selection using computational intelligent techniques for intrusion detection. London: Springer London. 285–306 (2005)
  20. R. Datti, S. Lakhina, Performance comparison of features reduction techniques for intrusion detection system, International Journal of Compute Science and Technology, 3, 1: 332–335 (2012)
  21. C.-F. Tsai, C.-Y. Lin, A triangle area based nearest neighbors approach to intrusion detection, Pattern Recognition, 43, 1: 222–229 (2010) [CrossRef]
  22. C. Guo, Y. Zhou, Y. Ping, Z. Zhang, G. Liu, Y. Yang, A distance sum-based hybrid method for intrusion detection, Applied Intelligence, 40, 1: 178-188 (2014)
  23. W.C. Lin, S.W. Ke, C.F. Tsai, Cann: An intrusion detection system based on combining cluster centers and nearest neighbors, KNOWLEDGE-BASED SYSTEMS, 78: 13–21 (2015) [CrossRef]
  24. W. Hong, X. Li, The new graphical features of star plot for k nearest neighbor classifier. 4682, Berlin, Heidelberg: Springer Berlin Heidelberg. 926–933 (2007)
  25. J. Parkinson, M. Blaxter, Simitri - visualizing similarity relationshipsforgroupsofsequences, BIOINFORMATICS, 19, 3: 390–395 (2003) [CrossRef]
  26. B. Luo, J.B. Xia, A novel intrusion detection system based on feature generation with visualization strategy, EXPERT SYSTEMS WITH APPLICATIONS, 41, 9: 4139–4147 (2014) [CrossRef]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.