A study on intrusion detection using neural networks trained with evolutionary algorithms
Published 2015 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A study on intrusion detection using neural networks trained with evolutionary algorithms
Authors
Keywords
Intrusion detection, Intrusion detection system, Artificial neural network, NSL-KDD
Journal
SOFT COMPUTING
Volume 21, Issue 10, Pages 2687-2700
Publisher
Springer Nature
Online
2015-12-09
DOI
10.1007/s00500-015-1967-z
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Evolving statistical rulesets for network intrusion detection
- (2015) Samaneh Rastegari et al. APPLIED SOFT COMPUTING
- A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection
- (2014) Fangjun Kuang et al. SOFT COMPUTING
- A distributed approach to network anomaly detection based on independent component analysis
- (2013) Francesco Palmieri et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
- (2013) Gisung Kim et al. EXPERT SYSTEMS WITH APPLICATIONS
- Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components
- (2013) Iftikhar Ahmad et al. NEURAL COMPUTING & APPLICATIONS
- Network anomaly detection with the restricted Boltzmann machine
- (2013) Ugo Fiore et al. NEUROCOMPUTING
- Automatic network intrusion detection: Current techniques and open issues
- (2012) Carlos A. Catania et al. COMPUTERS & ELECTRICAL ENGINEERING
- EAACK—A Secure Intrusion-Detection System for MANETs
- (2012) Elhadi M. Shakshuki et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
- A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems
- (2012) J. Gómez et al. SOFT COMPUTING
- Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
- (2012) Fenye Bao et al. IEEE Transactions on Network and Service Management
- Distributed denial of service attack detection using an ensemble of neural classifier
- (2011) P. Arun Raj Kumar et al. COMPUTER COMMUNICATIONS
- Network anomaly detection through nonlinear analysis
- (2010) Francesco Palmieri et al. COMPUTERS & SECURITY
- A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
- (2010) Gang Wang et al. EXPERT SYSTEMS WITH APPLICATIONS
- A novel intrusion detection system based on hierarchical clustering and support vector machines
- (2010) Shi-Jinn Horng et al. EXPERT SYSTEMS WITH APPLICATIONS
- An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks
- (2010) Sooyeon Shin et al. IEEE Transactions on Industrial Informatics
- An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming
- (2010) Shingo Mabu et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- A hybrid intrusion detection system design for computer network security
- (2009) M. Ali Aydın et al. COMPUTERS & ELECTRICAL ENGINEERING
- A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
- (2009) Jiankun Hu et al. IEEE NETWORK
- GSA: A Gravitational Search Algorithm
- (2009) Esmat Rashedi et al. INFORMATION SCIENCES
- Internet traffic modeling by means of Hidden Markov Models
- (2008) Alberto Dainotti et al. Computer Networks
- Critical study of neural networks in detecting intrusions
- (2008) Rachid Beghdad COMPUTERS & SECURITY
- Data mining-based intrusion detectors
- (2008) Su-Yun Wu et al. EXPERT SYSTEMS WITH APPLICATIONS
- A study on the use of non-parametric tests for analyzing the evolutionary algorithms’ behaviour: a case study on the CEC’2005 Special Session on Real Parameter Optimization
- (2008) Salvador García et al. JOURNAL OF HEURISTICS
- Intrusion detection using a linguistic hedged fuzzy-XCS classifier system
- (2008) Javier G. Marín-Blázquez et al. SOFT COMPUTING
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search