Network intrusion detection based on ensemble classification and feature selection method for cloud computing
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Network intrusion detection based on ensemble classification and feature selection method for cloud computing
Authors
Keywords
-
Journal
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
Volume -, Issue -, Pages -
Publisher
Wiley
Online
2022-01-25
DOI
10.1002/cpe.6838
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Enhancing the weighted voting ensemble algorithm for tuberculosis predictive diagnosis
- (2021) Victor Chukwudi Osamor et al. Scientific Reports
- Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach
- (2021) Ebrima Jaw et al. Symmetry-Basel
- The multi-demeanor fusion based robust intrusion detection system for anomaly and misuse detection in computer networks
- (2020) Akshay Rameshbhai Gupta et al. Journal of Ambient Intelligence and Humanized Computing
- Building an efficient intrusion detection system based on feature selection and ensemble classifier
- (2020) Yuyang Zhou et al. Computer Networks
- Ensemble approach for network threat detection and classification on cloud computing
- (2019) S. Krishnaveni et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
- (2018) Shadi Aljawarneh et al. Journal of Computational Science
- A Filter Feature Selection Algorithm Based on Mutual Information for Intrusion Detection
- (2018) Fei Zhao et al. Applied Sciences-Basel
- Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection
- (2018) Fadi Salo et al. Computer Networks
- Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
- (2016) Opeyemi Osanaiye et al. EURASIP Journal on Wireless Communications and Networking
- Modified parallel random forest for intrusion detection systems
- (2016) Saman Masarat et al. JOURNAL OF SUPERCOMPUTING
- MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method
- (2013) P. Gogoi et al. COMPUTER JOURNAL
- A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
- (2013) Gisung Kim et al. EXPERT SYSTEMS WITH APPLICATIONS
- A survey of network flow applications
- (2013) Bingdong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
- (2012) P. Arun Raj Kumar et al. COMPUTER COMMUNICATIONS
- A novel intrusion severity analysis approach for Clouds
- (2011) Junaid Arshad et al. Future Generation Computer Systems-The International Journal of eScience
- Intrusion detection using fuzzy association rules
- (2008) Arman Tajbakhsh et al. APPLIED SOFT COMPUTING
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExplorePublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More