共 18 条
[1]
Jallad K.A., Aljnidi M., Desouki M.S., Big data analysis and distributed deep learning for next-generation intrusion detection system optimization, J. Big. Data, 6, 1, (2019)
[2]
Ethala K., Sheshadri R., Chakkaravarthy S.S., WIDS Real-Time Intrusion Detection System Using Entrophical Approach, Adv. Intell. Syst. Comput, 324, pp. 73-79, (2015)
[3]
Abusitta A., Bellaiche M., Dagenais M., Multi-cloud cooperative intrusion detection system: trust and fairness assurance, Ann. Telecommun, 74, 4, pp. 1-17, (2019)
[4]
Singh O., Singh J., Singh R., Multi-level trust-based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET, Cluster. Comput, pp. 1-13, (2017)
[5]
Peng K., Leung V.C.M., Huang Q., Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System over Big Data, IEEE Access, 6, pp. 11897-11906, (2018)
[6]
Al-Yaseen W.L., Othman Z.A., Nazri M.Z.A., Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system, Expert. Syst. Appl, 67, pp. 296-303, (2017)
[7]
Hodo E., Bellekens X., Hamilton A., Dubouilh P.L., Et al., Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System, Tetrahedron. Lett, 42, 39, pp. 6865-6867, (2017)
[8]
Shah S.A.R., Issac B., Jacob S.M., Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning, Int J. Comput. Intell. Appl, 4, (2018)
[9]
Khamphakdee N., Benjamas N., Saiyod S., Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining, J. ICT Res. Appl, 8, 3, pp. 234-250, (2015)
[10]
Wang Y., Yu G., Zhang J., Combination of PF_RING with NAPI packet capture performance optimization and simulation, Comput. Eng. Appl, 49, 8, pp. 81-84, (2013)