Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
misuse detection
biblio
A Review on Intrusion Detection System Using Machine Learning Techniques
Submitted by grigby1 on Thu, 02/24/2022 - 2:51pm
Classification algorithms
Ensemble
hybrid
Intrusion Detection
intrusion detection system
machine learning
machine learning algorithms
Metrics
misuse detection
Neural networks
Predictive models
predictive security metrics
pubcrawl
security
Single classifiers
biblio
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
reduced dataset
Intrusion Detection
intrusion detection system
Metrics
misuse detection
network technologies
pattern clustering
pubcrawl
rapid development
Internet rapid development
resilience
Resiliency
security
security of data
Time complexity
Training
weighted fuzzy C-mean clustering algorithm
Anomaly Detection
input data space
hybrid approach
Fuzzy sets
fuzzy set theory
fuzzy logic scheme
Fuzzy logic
fuzzy association rules
feature extraction
deep learning
decrease resource utilization
Decision Making
considerable increase
computer networks
Clustering algorithms
anomaly intrusions
biblio
Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly
Submitted by BrandonB on Fri, 05/01/2015 - 8:38am
localized periodicity analysis
wavelet multiresolution analysis method
wavelet analysis
traffic anomaly
Time-frequency Analysis
RoQ attack
reduction of quality
network traffic
network security
Multiresolution analysis
misuse detection
Algorithm design and analysis
inhibit normal TCP flows
detection systems
detection algorithms
detection algorithm
denial of service attack
Correlation
computer network security
Computer crime
autocorrelation analysis
Anomaly Detection
biblio
Mobile agent based intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 1:26pm
mobile agent
suspicious patterns identification
signal processing
security of data
NIDS
network-based system
network activity
mobile agents
mobile agent based intrusion detection system
Anomaly Detection
misuse detection
Intrusion Detection
internet
Informatics
host-based system
cyber attack
Conferences
Computers