ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Performance Analysis of SDN-Based Intrusion Detection Model with Feature Selection Approach
Proceedings of International Joint Conference on Computational Intelligence - Algorithms for Intelligent Systems
◽
10.1007/978-981-13-7564-4_41
◽
2019
◽
pp. 483-494
◽
Cited By ~ 2
Author(s):
Samrat Kumar Dey
◽
Md. Raihan Uddin
◽
Md. Mahbubur Rahman
Keyword(s):
Feature Selection
◽
Performance Analysis
◽
Intrusion Detection
◽
Detection Model
◽
Selection Approach
◽
Feature Selection Approach
Download Full-text
Related Documents
Cited By
References
A Feature Selection Approach for Network Intrusion Detection Based on Tree-Seed Algorithm and K-Nearest Neighbor
2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)
◽
10.1109/idaacs-sws.2018.8525522
◽
2018
◽
Cited By ~ 3
Author(s):
Feng Chen
◽
Zhiwei Ye
◽
Chunzhi Wang
◽
Lingyu Yan
◽
Ruoxi Wang
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Nearest Neighbor
◽
Network Intrusion Detection
◽
K Nearest Neighbor
◽
Network Intrusion
◽
Selection Approach
◽
Feature Selection Approach
◽
Tree Seed
Download Full-text
Genetic algorithm based feature selection approach for effective intrusion detection system
2015 International Conference on Computer Communication and Informatics (ICCCI)
◽
10.1109/iccci.2015.7218109
◽
2015
◽
Cited By ~ 12
Author(s):
Ketan Sanjay Desale
◽
Roshani Ade
Keyword(s):
Genetic Algorithm
◽
Feature Selection
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Selection Approach
◽
Feature Selection Approach
Download Full-text
An Effective Feature Selection Approach for Network Intrusion Detection
2013 IEEE Eighth International Conference on Networking, Architecture and Storage
◽
10.1109/nas.2013.49
◽
2013
◽
Cited By ~ 21
Author(s):
Fengli Zhang
◽
Dan Wang
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Selection Approach
◽
Feature Selection Approach
Download Full-text
Federated Learning-Based Network Intrusion Detection with a Feature Selection Approach
10.1109/icecce52056.2021.9514222
◽
2021
◽
Author(s):
Yang Qin
◽
Masaaki Kondo
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Selection Approach
◽
Feature Selection Approach
Download Full-text
A feature selection approach implemented with the Binary Bat Algorithm applied for intrusion detection
2015 38th International Conference on Telecommunications and Signal Processing (TSP)
◽
10.1109/tsp.2015.7296215
◽
2015
◽
Cited By ~ 5
Author(s):
Adriana-Cristina Enache
◽
Valentin Sgarciu
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Bat Algorithm
◽
Selection Approach
◽
Feature Selection Approach
Download Full-text
A Hybrid Bat Based Feature Selection Approach for Intrusion Detection
Communications in Computer and Information Science - Bio-Inspired Computing - Theories and Applications
◽
10.1007/978-3-662-45049-9_38
◽
2014
◽
pp. 230-238
◽
Cited By ~ 3
Author(s):
Mohamed Amine Laamari
◽
Nadjet Kamel
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Selection Approach
◽
Feature Selection Approach
Download Full-text
Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection
Machine Learning for Computer and Cyber Security
◽
10.1201/9780429504044-8
◽
2019
◽
pp. 184-208
◽
Cited By ~ 3
Author(s):
Ammar Almomani
◽
Mohammed Alweshah
◽
Saleh Al Khalayleh
◽
Mohammed Al-Refai
◽
Riyadh Qashi
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Metaheuristic Algorithms
◽
Selection Approach
◽
Feature Selection Approach
Download Full-text
Multi-agent Intrusion Detection System Using Feature Selection Approach
2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
◽
10.1109/iih-msp.2014.137
◽
2014
◽
Cited By ~ 4
Author(s):
Yi Gong
◽
Yong Fang
◽
Liang Liu
◽
Juan Li
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Selection Approach
◽
Multi Agent
◽
Feature Selection Approach
Download Full-text
A feature selection approach to find optimal feature subsets for the network intrusion detection system
Cluster Computing
◽
10.1007/s10586-015-0527-8
◽
2016
◽
Vol 19
(1)
◽
pp. 325-333
◽
Cited By ~ 26
Author(s):
Seung-Ho Kang
◽
Kuinam J. Kim
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Selection Approach
◽
Feature Selection Approach
◽
Optimal Feature
Download Full-text
A Network Intrusion Detection System Based On Ensemble CVM Using Efficient Feature Selection Approach
Procedia Computer Science
◽
10.1016/j.procs.2018.10.416
◽
2018
◽
Vol 143
◽
pp. 442-449
◽
Cited By ~ 5
Author(s):
T.H. Divyasree
◽
K.K. Sherly
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Selection Approach
◽
Feature Selection Approach
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close