A systematic review on intrusion detection based on the Hidden Markov Model
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A systematic review on intrusion detection based on the Hidden Markov Model
Authors
Keywords
-
Journal
Statistical Analysis and Data Mining
Volume 11, Issue 3, Pages 111-134
Publisher
Wiley
Online
2018-04-27
DOI
10.1002/sam.11377
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Sequential fraud detection for prepaid cards using hidden Markov model divergence
- (2018) William N. Robinson et al. EXPERT SYSTEMS WITH APPLICATIONS
- Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network
- (2018) Akhil Gupta et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Real-time multistep attack prediction based on Hidden Markov Models
- (2017) Pilar Holgado et al. IEEE Transactions on Dependable and Secure Computing
- Statistical Anomaly Detection in Human Dynamics Monitoring Using a Hierarchical Dirichlet Process Hidden Markov Model
- (2017) Takashi Fuse et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- The state of the art on design patterns: A systematic mapping of the literature
- (2017) B. Bafandeh Mayvan et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Malware classification using dynamic features and Hidden Markov Model
- (2016) Mohammad Imran et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- Fraud detection system: A survey
- (2016) Aisha Abdallah et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of IT early warning systems: architectures, challenges, and solutions
- (2016) Ali Ahmadian Ramaki et al. Security and Communication Networks
- A review of data mining applications in crime
- (2016) Hossein Hassani et al. Statistical Analysis and Data Mining
- RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection
- (2015) Ali Ahmadian Ramaki et al. COMPUTERS & SECURITY
- A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems
- (2015) Adel Sabry Eesa et al. EXPERT SYSTEMS WITH APPLICATIONS
- A survey of intrusion detection techniques for cyber-physical systems
- (2014) Robert Mitchell et al. ACM COMPUTING SURVEYS
- Statistical learning methods for information security: fundamentals and case studies
- (2014) H.-K. Pao et al. APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY
- Multi-Observer Privacy-Preserving Hidden Markov Models
- (2013) Hung X. Nguyen et al. IEEE TRANSACTIONS ON SIGNAL PROCESSING
- Advanced probabilistic approach for network intrusion forecasting and detection
- (2012) Seongjun Shin et al. EXPERT SYSTEMS WITH APPLICATIONS
- Intrusion detection system: A comprehensive review
- (2012) Hung-Jen Liao et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- HMMPayl: An intrusion detection system based on Hidden Markov Models
- (2011) Davide Ariu et al. COMPUTERS & SECURITY
- Anomaly detection
- (2009) Varun Chandola et al. ACM COMPUTING SURVEYS
- A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
- (2009) Jiankun Hu et al. IEEE NETWORK
- A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
- (2009) Xuan Dau Hoang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Latent variable mining with its applications to anomalous behavior detection
- (2009) Shunsuke Hirose et al. Statistical Analysis and Data Mining
- How to deal with malicious users in privacy-preserving distributed data mining
- (2009) Yitao Duan et al. Statistical Analysis and Data Mining
- Credit Card Fraud Detection Using Hidden Markov Model
- (2008) A. Srivastava et al. IEEE Transactions on Dependable and Secure Computing
- Projecting Cyberattacks Through Variable-Length Markov Models
- (2008) D.S. Fava et al. IEEE Transactions on Information Forensics and Security
- Systematic literature reviews in software engineering – A systematic literature review
- (2008) Barbara Kitchenham et al. INFORMATION AND SOFTWARE TECHNOLOGY
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started