ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Firefly algorithm based feature selection for network intrusion detection
Computers & Security
◽
10.1016/j.cose.2018.11.005
◽
2019
◽
Vol 81
◽
pp. 148-155
◽
Cited By ~ 44
Author(s):
Selvakumar B
◽
Muneeswaran K
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Firefly Algorithm
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Selection For
Download Full-text
Related Documents
Cited By
References
Bootstrap-based homogeneous ensemble feature selection for network intrusion detection system
Developments of Artificial Intelligence Technologies in Computation and Robotics
◽
10.1142/9789811223334_0004
◽
2020
◽
Author(s):
Yeshalem Gezahegn Damtew
◽
Hongmei Chen
◽
Burhan Mohi Yu Din
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Selection For
◽
Homogeneous Ensemble
Download Full-text
Linear Correlation-Based Feature Selection for Network Intrusion Detection Model
Communications in Computer and Information Science - Advances in Security of Information and Communication Networks
◽
10.1007/978-3-642-40597-6_21
◽
2013
◽
pp. 240-248
◽
Cited By ~ 23
Author(s):
Heba F. Eid
◽
Aboul Ella Hassanien
◽
Tai-hoon Kim
◽
Soumya Banerjee
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Linear Correlation
◽
Network Intrusion Detection
◽
Detection Model
◽
Network Intrusion
◽
Correlation Based Feature Selection
◽
Selection For
Download Full-text
A tree-based stacking ensemble technique with feature selection for network intrusion detection
Applied Intelligence
◽
10.1007/s10489-021-02968-1
◽
2022
◽
Author(s):
Mamunur Rashid
◽
Joarder Kamruzzaman
◽
Tasadduq Imam
◽
Santoso Wibowo
◽
Steven Gordon
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Ensemble Technique
◽
Network Intrusion
◽
Selection For
Download Full-text
Improved Incremental Support Vector Machine with Hybrid Feature Selection for Network Intrusion Detection
2013 International Conference on Information and Network Security (ICINS 2013)
◽
10.1049/cp.2013.2450
◽
2013
◽
Author(s):
Xiaocong Zhou
◽
Yang Yi
◽
Dongling Luo
Keyword(s):
Support Vector Machine
◽
Feature Selection
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Support Vector
◽
Network Intrusion
◽
Selection For
Download Full-text
Hybrid Feature Selection for Network Intrusion Detection Using Data Mining
International Journal of Scientific and Research Publications (IJSRP)
◽
10.29322/ijsrp.10.05.2020.p101110
◽
2020
◽
Vol 10
(05)
◽
pp. 929-936
Author(s):
V Manikandan
◽
S Karthikeyan
◽
T Bhuvaneswari
Keyword(s):
Data Mining
◽
Feature Selection
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Selection For
◽
Using Data
Download Full-text
Filter Versus Wrapper Feature Selection for Network Intrusion Detection System
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)
◽
10.1109/icicis46948.2019.9014797
◽
2019
◽
Author(s):
Mahmoud M. Sakr
◽
Medhat A. Tawfeeq
◽
Ashraf B. El-Sisi
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Selection For
◽
Wrapper Feature Selection
Download Full-text
Feature selection for network intrusion detection based on quantum evolutionary algorithm
Journal of Computer Applications
◽
10.3724/sp.j.1087.2013.01357
◽
2013
◽
Vol 33
(5)
◽
pp. 1357-1361
Author(s):
Zongfei ZHANG
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Evolutionary Algorithm
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Selection For
Download Full-text
A Feature Selection Approach for Network Intrusion Detection Based on Tree-Seed Algorithm and K-Nearest Neighbor
2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)
◽
10.1109/idaacs-sws.2018.8525522
◽
2018
◽
Cited By ~ 3
Author(s):
Feng Chen
◽
Zhiwei Ye
◽
Chunzhi Wang
◽
Lingyu Yan
◽
Ruoxi Wang
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Nearest Neighbor
◽
Network Intrusion Detection
◽
K Nearest Neighbor
◽
Network Intrusion
◽
Selection Approach
◽
Feature Selection Approach
◽
Tree Seed
Download Full-text
A Naive Feature Selection Method and Its Application in Network Intrusion Detection
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.96
◽
2010
◽
Cited By ~ 1
Author(s):
Tieming Chen
◽
Xiaoming Pan
◽
Yiguang Xuan
◽
Jixia Ma
◽
Jie Jiang
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Feature Selection Method
◽
Selection Method
◽
Network Intrusion Detection
◽
Network Intrusion
Download Full-text
Influence Analysis of Feature Selection to Network Intrusion Detection System Performance Using NSL-KDD Dataset
2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)
◽
10.1109/icomitee.2019.8920961
◽
2019
◽
Cited By ~ 2
Author(s):
Lukman Hakim
◽
Rahilla Fatma
◽
Novriandi
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
System Performance
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Influence Analysis
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close