0% found this document useful (0 votes)
9 views1 page

Years Ref. Publications Datasets Methods (Algorithm) Techniques

Uploaded by

Amarudin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views1 page

Years Ref. Publications Datasets Methods (Algorithm) Techniques

Uploaded by

Amarudin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Years Ref.

Publications Datasets Methods (Algorithm) Techniques

[47] Foundations of Science Private CNN: Convolutional Neural Network Classification


[48] Journal of Ambient Intelligence and Humanized Computing Public J48, k-NN, SVM, Naïve Bayes Classification
[49] Neural Computing and Applications Public SVM Clustering,
Classification
[50] Personal and Ubiquitous Computing Public SVM Classification
[51] Journal of Ambient Intelligence and Humanized Computing Public Random Forest (RF) Classification
[5] Cluster Computing Public SVM Classification
[52] Neural Computing and Applications Public Decision Tree Classification
[29] International Journal of Information Security Public Neural Network (MLP) Classification
[53] Journal of Information Security and Applications Public Random Forest (RF), AdaBoost (ADB), Gaussian Naive Bayes (GNB), K-Nearest Classification
Neighbours
(KNN), and Quadratic Discriminant Analysis (QDA)
2020 [54] IEEE Access Public Neural Network Classification
[55] AEJ - Alexandria Engineering Journal Public Structural Sparse Logistic Regression, SVM Classification
[56] Computer Networks Public Deep Neural Networks (DNN), Long Short-Term Memory Recurrent Neural Networks Classification
(LSTM-RNN), and Deep Belief Networks (DBN)
[57] Computers & Security Public Real-time Alert Correlation (RACC) Clustering
[16] Future Generation Computer Systems Public - Dataset
Analysis
[58] Journal of Parallel and Distributed Computing Public Pattern Matching Classification
[59] Measurement: Journal of the International Measurement Public multi-convolutional neural network (multi-CNN) Classification
Confederation
[60] Soft Computing Public SVM Classification
[61] Journal of Ambient Intelligence and Humanized Computing Public SVM Classification
[62] Cluster Computing Public fuzzy c means (FCM), SVM Classification
[63] Peer-to-Peer Networking and Applications Public K-Means, K-Nearest Neighbor (KNN) Clustering,
Classification
[64] Journal of Ambient Intelligence and Humanized Computing Public Blcak Forest Classification
[13] Multimedia Tools and Applications Private Apriori, Generalized Sequential Pattern (GSP) Association
[19] Neural Computing and Applications Public Deep Neural Network (DNN), Logistic Regression, SVM, and Naive Bayes Classification
[65] Multimedia Tools and Applications Private Automata Classification

10.1016/j.jnca.2019.102422.
REFERENCES [16] Y. Al-Hadhrami and F. K. Hussain, “Real time dataset generation
framework for intrusion detection systems in IoT,” Futur. Gener.
[1] J. Gu, L. Wang, H. Wang, and S. Wang, “A novel approach to
Comput. Syst., vol. 108, pp. 414–423, Jul. 2020, doi:
intrusion detection using SVM ensemble with feature
10.1016/j.future.2020.02.051.
augmentation,” Comput. Secur., vol. 86, pp. 53–62, 2019, doi:
[17] C.-R. R. Wang, R.-F. F. Xu, S.-J. J. Lee, and C.-H. H. Lee,
10.1016/j.cose.2019.05.022.
“Network intrusion detection using equality constrained-
[2] S. Muller et al., “A training-resistant anomaly detection system,”
optimization-based extreme learning machines,” Knowledge-Based
Comput. Secur., vol. 76, pp. 1–11, 2018, doi:
Syst., vol. 147, pp. 68–80, 2018, doi: 10.1016/j.knosys.2018.02.015.
10.1016/j.cose.2018.02.015.
[18] W. Li, W. Meng, X. Luo, and L. F. Kwok, “MVPSys: Toward
[3] K. Wang, “Network data management model based on Naïve Bayes
practical multi-view based false alarm reduction system in network
classifier and deep neural networks in heterogeneous wireless
intrusion detection,” Comput. Secur., vol. 60, pp. 177–192, 2016,
networks,” Comput. Electr. Eng., vol. 75, pp. 135–145, 2019, doi:
doi: 10.1016/j.cose.2016.04.007.
10.1016/j.compeleceng.2019.02.015.
[19] P. Devan and N. Khare, “An efficient XGBoost–DNN-based
[4] R. Barnard, Intrusion Detection Systems, 2nd Edition. 1988.
classification model for network intrusion detection system,” Neural
[5] T. A. Alamiedy, M. Anbar, Z. N. M. Alqattan, and Q. M. Alzubi,
Comput. Appl., 2020, [Online]. Available:
“Anomaly-based intrusion detection system using multi-objective https://link.springer.com/content/pdf/10.1007/s00521-020-04708-
grey wolf optimisation algorithm,” J. Ambient Intell. Humaniz. x.pdf.
Comput., vol. 11, 2019, doi: 10.1007/s12652-019-01569-8. [20] S. Mohammadi, H. Mirvaziri, M. Ghazizadeh-Ahsaee, and H.
[6] H. Wang, J. Gu, and S. Wang, “An effective intrusion detection Karimipour, “Cyber intrusion detection by combined feature
framework based on SVM with feature augmentation,” Knowledge- selection algorithm,” J. Inf. Secur. Appl., vol. 44, pp. 80–88, 2019,
Based Syst., vol. 136, pp. 130–139, 2017, doi: doi: 10.1016/j.jisa.2018.11.007.
10.1016/j.knosys.2017.09.014. [21] A. Nisioti, A. Mylonas, P. D. Yoo, and V. Katos, “From intrusion
[7] P. Krishnan, S. Duttagupta, and K. Achuthan, “VARMAN: Multi- detection to attacker attribution: A comprehensive survey of
plane security framework for software defined networks,” Comput. unsupervised methods,” IEEE Commun. Surv. Tutorials Surv.
Commun., vol. 148, no. July, pp. 215–239, 2019, doi: Tutorials, vol. 20, no. 4, p. 3369, 2018, [Online]. Available:
10.1016/j.comcom.2019.09.014.
https://ieeexplore.ieee.org/abstract/document/8410366/.
[8] J. Liang, J. Chen, Y. Zhu, F. R. Yu, R. Yu, and F. R. Yu, “A novel [22] B. Kitchenham et al., Guidelines for performing Systematic
Intrusion Detection System for Vehicular Ad Hoc Networks Literature Reviews in Software Engineering. 2007.
(VANETs) based on differences of traffic flow and position,” Appl. [23] X. F. Chen and S. Z. Yu, “CIPA: A collaborative intrusion
Soft Comput. J., vol. 75, pp. 712–727, 2019, doi: prevention architecture for programmable network and SDN,”
10.1016/j.asoc.2018.12.001. Comput. Secur., vol. 58, pp. 1–19, 2016, doi:
[9] M. Gajewski et al., “Two-tier anomaly detection based on traffic 10.1016/j.cose.2015.11.008.
profiling of the home automation system,” Comput. Networks, vol. [24] M. M. Rathore, A. Ahmad, and A. Paul, “Real time intrusion
158, pp. 46–60, 2019, doi: 10.1016/j.comnet.2019.04.013. detection system for ultra-high-speed big data environments,” J.
[10] X. An, J. Su, X. Lü, and F. Lin, “Hypergraph clustering model-based Supercomput., 2016, [Online]. Available:
association analysis of DDOS attacks in fog computing intrusion https://link.springer.com/article/10.1007/s11227-015-1615-5.
detection system,” Eurasip J. Wirel. Commun. Netw., vol. 11, p. 249, [25] C. Azad and V. K. Jha, “Fuzzy min–max neural network and particle
2018, doi: 10.1186/s13638-018-1267-2.
swarm optimization based intrusion detection system,” Microsyst.
[11] E. M. Roopa Devi and R. C. Suganthe, “Improved Relevance Vector Technol., vol. 23, no. 4, pp. 907–918, 2016, doi: 10.1007/s00542-
Machine (IRVM) classifier for Intrusion Detection System,” Soft 016-2873-8.
Comput., vol. 23, no. 19, pp. 9111–9119, Oct. 2019, doi: [26] W. L. Al-Yaseen, Z. A. Othman, and M. Z. A. Nazri, “Multi-level
10.1007/s00500-018-3621-z. hybrid support vector machine and extreme learning machine based
[12] C. Callegari, S. Giordano, and M. Pagano, “An information-theoretic on modified K-means for intrusion detection system,” Expert Syst.
method for the detection of anomalies in network traffic,” Comput. Appl., vol. 67, pp. 296–303, 2017, doi: 10.1016/j.eswa.2016.09.041.
Secur., vol. 70, pp. 351–365, 2017, doi: 10.1016/j.cose.2017.07.004. [27] X. Zou, J. Cao, Q. Guo, and T. Wen, “A novel network security
[13] Y. Liu, L. Zhu, and F. Liu, “Design of Multimedia Education algorithm based on improved support vector machine from smart
Network Security and Intrusion Detection System,” Multimed. Tools city perspective,” Comput. Electr. Eng., vol. 65, no. 3, pp. 67–78,
Appl., 2020, doi: 10.1007/s11042-020-08724-w. 2018, doi: 10.1016/j.compeleceng.2017.09.028.
[14] I. Ghafir et al., “Detection of advanced persistent threat using [28] E. Kabir, J. Hu, H. Wang, G. Zhuo, H. Wang, and G. Zhuo, “A novel
machine-learning correlation analysis,” Futur. Gener. Comput. Syst., statistical technique for intrusion detection systems,” Futur. Gener.
vol. 89, pp. 349–359, 2018, doi: 10.1016/j.future.2018.06.055. Comput. Syst., vol. 79, pp. 303–318, 2018, doi:
[15] J. Manan, A. Ahmed, I. Ullah, L. Merghem-Boulahia, and D. Gaïti, 10.1016/j.future.2017.01.029.
“Distributed intrusion detection scheme for next generation [29] W. Ghanem and A. Jantan, “A new approach for intrusion detection
networks,” J. Netw. Comput. Appl., vol. 147, p. 102422, 2019, doi:

You might also like