- Home
- Publications
- Publication Search
- Publication Details
Title
Intrusion detection taxonomy and data preprocessing mechanisms
Authors
Keywords
-
Journal
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
Volume 34, Issue 3, Pages 1369-1383
Publisher
IOS Press
Online
2018-03-24
DOI
10.3233/jifs-169432
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A hybrid and learning agent architecture for network intrusion detection
- (2017) Adriana Leite et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Contextual information fusion for intrusion detection: a survey and taxonomy
- (2017) Ahmed Aleroud et al. KNOWLEDGE AND INFORMATION SYSTEMS
- FACID: A trust-based collaborative decision framework for intrusion detection networks
- (2016) Carol J. Fung et al. Ad Hoc Networks
- An efficient proactive artificial immune system based anomaly detection and prevention system
- (2016) Praneet Saurabh et al. EXPERT SYSTEMS WITH APPLICATIONS
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- Towards scalable rough set based attribute subset selection for intrusion detection using parallel genetic algorithm in MapReduce
- (2016) El-Sayed M. El-Alfy et al. SIMULATION MODELLING PRACTICE AND THEORY
- Taxonomy and Survey of Collaborative Intrusion Detection
- (2015) Emmanouil Vasilomanolakis et al. ACM COMPUTING SURVEYS
- Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
- (2015) Keke Gai et al. Security and Communication Networks
- A survey of intrusion detection techniques for cyber-physical systems
- (2014) Robert Mitchell et al. ACM COMPUTING SURVEYS
- A Survey of Intrusion Detection Systems in Wireless Sensor Networks
- (2013) Ismail Butun et al. IEEE Communications Surveys and Tutorials
- Network attacks: Taxonomy, tools and systems
- (2013) N. Hoque et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
- (2012) Shih-Wei Lin et al. APPLIED SOFT COMPUTING
- Automatic network intrusion detection: Current techniques and open issues
- (2012) Carlos A. Catania et al. COMPUTERS & ELECTRICAL ENGINEERING
- EAACK—A Secure Intrusion-Detection System for MANETs
- (2012) Elhadi M. Shakshuki et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
- A Survey of Discretization Techniques: Taxonomy and Empirical Analysis in Supervised Learning
- (2012) Salvador Garcia et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- An intrusion detection and prevention system in cloud computing: A systematic review
- (2012) Ahmed Patel et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Intrusion detection system: A comprehensive review
- (2012) Hung-Jen Liao et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of intrusion detection techniques in Cloud
- (2012) Chirag Modi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Statistical approach to normalization of feature vectors and clustering of mixed datasets
- (2012) M. M. Suarez-Alvarez et al. PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES
- Data preprocessing for anomaly based network intrusion detection: A review
- (2011) Jonathan J. Davis et al. COMPUTERS & SECURITY
- Swarm intelligence in intrusion detection: A survey
- (2011) C. Kolias et al. COMPUTERS & SECURITY
- Decision tree based light weight intrusion detection using a wrapper approach
- (2011) Siva S. Sivatha Sindhu et al. EXPERT SYSTEMS WITH APPLICATIONS
- Empirical study of feature selection methods based on individual feature evaluation for classification problems
- (2010) Antonio Arauzo-Azofra et al. EXPERT SYSTEMS WITH APPLICATIONS
- Incremental SVM based on reserved set for network intrusion detection
- (2010) Yang Yi et al. EXPERT SYSTEMS WITH APPLICATIONS
- Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset
- (2010) V. Bolón-Canedo et al. EXPERT SYSTEMS WITH APPLICATIONS
- Soft computing in intrusion detection: the state of the art
- (2010) Chet Langin et al. Journal of Ambient Intelligence and Humanized Computing
- The use of computational intelligence in intrusion detection systems: A review
- (2009) Shelly Xiaonan Wu et al. APPLIED SOFT COMPUTING
- A survey of coordinated attacks and collaborative intrusion detection
- (2009) Chenfeng Vincent Zhou et al. COMPUTERS & SECURITY
- Conversion methods for symbolic features: A comparison applied to an intrusion detection problem
- (2009) E. Hernández-Pereira et al. EXPERT SYSTEMS WITH APPLICATIONS
- Intrusion detection by machine learning: A review
- (2009) Chih-Fong Tsai et al. EXPERT SYSTEMS WITH APPLICATIONS
- Decentralized multi-dimensional alert correlation for collaborative intrusion detection
- (2009) Chenfeng Vincent Zhou et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Anomaly-based network intrusion detection: Techniques, systems and challenges
- (2008) P. García-Teodoro et al. COMPUTERS & SECURITY
- Autonomous decision on intrusion detection with trained BDI agents
- (2007) Agustín Orfila et al. COMPUTER COMMUNICATIONS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started