Online Feature Ranking for Intrusion Detection Systems Authors: Buse Gul Atli, Alexander Jung | Published: 2018-03-01 | Updated: 2018-06-15 ML-Based IDSData Collection MethodMachine Learning Technology 2018.03.01 2025.05.13 Literature Database
Fusion of ANN and SVM Classifiers for Network Attack Detection Authors: Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi | Published: 2018-01-09 | Updated: 2018-01-10 ML-Based IDSData PreprocessingMachine Learning Method 2018.01.09 2025.05.13 Literature Database
Evaluation of Machine Learning Algorithms for Intrusion Detection System Authors: Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh | Published: 2018-01-08 ML-Based IDSData PreprocessingMachine Learning Method 2018.01.08 2025.05.13 Literature Database
Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach Authors: Khoi Khac Nguyen, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Diep Nguyen, Eryk Dutkiewicz | Published: 2017-12-16 ML-Based IDSProactive DefenseMachine Learning Algorithm 2017.12.16 2025.05.13 Literature Database
Advanced Analytics for Connected Cars Cyber Security Authors: Matan Levi, Yair Allouche, Aryeh Kontorovich | Published: 2017-11-06 | Updated: 2017-11-08 HMM Model GenerationML-Based IDSDiscussion on Protocol Vulnerabilities and Attack Scenarios 2017.11.06 2025.05.13 Literature Database