ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System
Advances in Intelligent Systems and Computing - Recent Developments in Intelligent Computing, Communication and Devices
◽
10.1007/978-981-10-3779-5_10
◽
2017
◽
pp. 73-87
◽
Cited By ~ 1
Author(s):
Jamal Hussain
◽
Samuel Lalmuanawma
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Intrusion Detection System
◽
Detection System
◽
Detection Technique
◽
Hybrid Network
◽
Network Intrusion Detection
◽
Misuse Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Related Documents
Cited By
References
Network Intrusion Detection System Using Naïve Bayes Classification Technique for Anomaly Detection
10.1201/9781003140023-11
◽
2021
◽
pp. 167-187
Author(s):
Sam Goundar
◽
Manveer Singh
◽
Rahul Chand
◽
Akashdeep Bhardwaj
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Intrusion Detection System
◽
Naive Bayes
◽
Detection System
◽
Naïve Bayes
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Classification Technique
◽
Network Intrusion Detection System
Download Full-text
A Suricata and Machine Learning Based Hybrid Network Intrusion Detection System
Advances in Information, Communication and Cybersecurity - Lecture Notes in Networks and Systems
◽
10.1007/978-3-030-91738-8_43
◽
2022
◽
pp. 474-485
Author(s):
Said Ouiazzane
◽
Malika Addou
◽
Fatimazahra Barramou
Keyword(s):
Machine Learning
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Hybrid Network
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System
10.1145/3472634.3472656
◽
2021
◽
Author(s):
Yihong Yang
◽
Xiaolong Xu
◽
Lina Wang
◽
Weiyi Zhong
◽
Chao Yan
◽
...
Keyword(s):
Intrusion Detection
◽
Anomaly Detection
◽
Intrusion Detection System
◽
Data Stream
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
A new model of intelligent hybrid network intrusion detection system
2010 International Conference on Bioinformatics and Biomedical Technology
◽
10.1109/icbbt.2010.5478935
◽
2010
◽
Cited By ~ 1
Author(s):
Xuedou Yu
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Hybrid Network
◽
Network Intrusion Detection
◽
New Model
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597201
◽
2013
◽
Cited By ~ 22
Author(s):
Chirag N. Modi
◽
Dhiren Patel
Keyword(s):
Cloud Computing
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Hybrid Network
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
STL-HDL: A NEW HYBRID NETWORK INTRUSION DETECTION SYSTEM FOR IMBALANCED DATASET ON BIG DATA ENVIRONMENT
Computers & Security
◽
10.1016/j.cose.2021.102435
◽
2021
◽
pp. 102435
Author(s):
Samed AL
◽
Murat DENER
Keyword(s):
Big Data
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Hybrid Network
◽
Network Intrusion Detection
◽
Imbalanced Dataset
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Data Environment
Download Full-text
A hybrid network intrusion detection system using simplified swarm optimization (SSO)
Applied Soft Computing
◽
10.1016/j.asoc.2012.04.020
◽
2012
◽
Vol 12
(9)
◽
pp. 3014-3022
◽
Cited By ~ 80
Author(s):
Yuk Ying Chung
◽
Noorhaniza Wahid
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Hybrid Network
◽
Network Intrusion Detection
◽
Swarm Optimization
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Hybrid network intrusion detection system using expert rule based approach
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology - CCSEIT '12
◽
10.1145/2393216.2393225
◽
2012
◽
Cited By ~ 2
Author(s):
A. S. Aneetha
◽
T. S. Indhu
◽
S. Bose
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Hybrid Network
◽
Network Intrusion Detection
◽
Rule Based
◽
Expert Rule
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Rule Based Approach
Download Full-text
Proposal to WNIDS Wireless Network Intrusion Detection System
International Journal of Scientific Research
◽
10.15373/22778179/oct2013/29
◽
2012
◽
Vol 2
(10)
◽
pp. 4-8
Author(s):
Dr. Saad K Majeed
◽
◽
Dr. Soukaena H Hashem
◽
Ikhlas K Gbashi
Keyword(s):
Intrusion Detection
◽
Wireless Network
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Genetic Algorithm's Fitness Value and False Positive in Network Intrusion Detection System
i-manager’s Journal on Software Engineering
◽
10.26634/jse.3.2.244
◽
2008
◽
Vol 3
(2)
◽
pp. 14-19
Author(s):
Jeya S
Keyword(s):
Intrusion Detection
◽
False Positive
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Fitness Value
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close