Hybrid intrusion detection system based on Dempster-Shafer evidence theory
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Hybrid intrusion detection system based on Dempster-Shafer evidence theory
Authors
Keywords
Intrusion detection system, Machine learning, Dempster-Shafer theory, Early detection, Hybrid framework
Journal
COMPUTERS & SECURITY
Volume 117, Issue -, Pages 102709
Publisher
Elsevier BV
Online
2022-03-29
DOI
10.1016/j.cose.2022.102709
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A survey of the recent architectures of deep convolutional neural networks
- (2020) Asifullah Khan et al. ARTIFICIAL INTELLIGENCE REVIEW
- I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems
- (2020) Punam Bedi et al. APPLIED INTELLIGENCE
- SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism
- (2020) Dongzi Jin et al. COMPUTERS & SECURITY
- DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System
- (2020) Pengfei Sun et al. Security and Communication Networks
- Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks
- (2020) Ayoub Alsarhan et al. WIRELESS PERSONAL COMMUNICATIONS
- Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms
- (2019) Zouhair Chiba et al. COMPUTERS & SECURITY
- A survey of network-based intrusion detection data sets
- (2019) Markus Ring et al. COMPUTERS & SECURITY
- Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
- (2019) Mohamed Amine Ferrag et al. Journal of Information Security and Applications
- A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- (2018) Preeti Mishra et al. IEEE Communications Surveys and Tutorials
- TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest
- (2018) Erxue Min et al. Security and Communication Networks
- An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection
- (2018) Tamer Aldwairi et al. Computer Networks
- Forest PA : Constructing a decision forest by penalizing attributes used in previous trees
- (2017) Md Nasim Adnan et al. EXPERT SYSTEMS WITH APPLICATIONS
- McPAD: A multiple classifier system for accurate payload-based anomaly detection
- (2008) Roberto Perdisci et al. Computer Networks
- Random-Forests-Based Network Intrusion Detection Systems
- (2008) Jiong Zhang et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started