Prathibha et al., 2014 - Google Patents
Analysis of hybrid intrusion detection system based on data mining techniquesPrathibha et al., 2014
- Document ID
- 4711703725189098308
- Author
- Prathibha K
- Kumar P
- Shyni T
- Publication year
- Publication venue
- International Journal of Engineering Trends and Technology (IJETT)—vol
External Links
- 238000001514 detection method 0 title abstract description 102
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Al-Khater et al. | Comprehensive review of cybercrime detection techniques | |
| Kanimozhi et al. | Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing | |
| Ho et al. | Detecting credential spearphishing in enterprise settings | |
| US10574681B2 (en) | Detection of known and unknown malicious domains | |
| Gogoi et al. | MLH-IDS: a multi-level hybrid intrusion detection method | |
| Bhavsar et al. | Intrusion detection system using data mining technique: Support vector machine | |
| Nayyar et al. | Recurrent neural network based intrusion detection system | |
| Kuyama et al. | Method for detecting a malicious domain by using whois and dns features | |
| Niu et al. | Identifying APT malware domain based on mobile DNS logging | |
| Norouzian et al. | Classifying attacks in a network intrusion detection system based on artificial neural networks | |
| Kornyo et al. | Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms | |
| Ahmad et al. | Application of artificial neural network in detection of probing attacks | |
| Hagos et al. | Enhancing security attacks analysis using regularized machine learning techniques | |
| Bian et al. | Host in danger? detecting network intrusions from authentication logs | |
| Churcher et al. | ur Rehman | |
| Mane et al. | Anomaly based ids using backpropagation neural network | |
| Kumar et al. | Detecting intrusions and attacks in the network traffic using anomaly based techniques | |
| Prathibha et al. | Analysis of hybrid intrusion detection system based on data mining techniques | |
| Sravani et al. | Comparative study of machine learning algorithm for intrusion detection system | |
| Revathi et al. | Profile similarity communication matching approaches for detection of duplicate profiles in online social network | |
| Li et al. | Enhancing cyber defense: using machine learning algorithms for detection of network anomalies | |
| Asaju et al. | Intrusion detection system on a computer network using an ensemble of randomizable filtered classifier, K-nearest neighbor algorithm | |
| Gautam et al. | Anomaly detection system using entropy based technique | |
| Bahrololum et al. | Anomaly intrusion detection system using hierarchical gaussian mixture model | |
| Eswaran et al. | Survey of cyber security approaches for attack detection and prevention |