Journal articles on the topic 'Network Intrusion Detection Systems (NIDS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network Intrusion Detection Systems (NIDS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kumar, Satish, Sunanda Gupta, and Sakshi Arora. "A comparative simulation of normalization methods for machine learning-based intrusion detection systems using KDD Cup’99 dataset." Journal of Intelligent & Fuzzy Systems 42, no. 3 (February 2, 2022): 1749–66. http://dx.doi.org/10.3233/jifs-211191.
Full textMulyanto, Mulyanto, Muhamad Faisal, Setya Widyawan Prakosa, and Jenq-Shiou Leu. "Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems." Symmetry 13, no. 1 (December 22, 2020): 4. http://dx.doi.org/10.3390/sym13010004.
Full textHu, Qinwen, Muhammad Rizwan Asghar, and Nevil Brownlee. "Effectiveness of Intrusion Detection Systems in High-speed Networks." International Journal of Information, Communication Technology and Applications 4, no. 1 (March 18, 2018): 1–10. http://dx.doi.org/10.17972/ijicta20184138.
Full textAlbasheer, Hashim, Maheyzah Md Siraj, Azath Mubarakali, Omer Elsier Tayfour, Sayeed Salih, Mosab Hamdan, Suleman Khan, Anazida Zainal, and Sameer Kamarudeen. "Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey." Sensors 22, no. 4 (February 15, 2022): 1494. http://dx.doi.org/10.3390/s22041494.
Full textHan, Jonghoo, and Wooguil Pak. "Hierarchical LSTM-Based Network Intrusion Detection System Using Hybrid Classification." Applied Sciences 13, no. 5 (February 27, 2023): 3089. http://dx.doi.org/10.3390/app13053089.
Full textHan, Jonghoo, and Wooguil Pak. "High Performance Network Intrusion Detection System Using Two-Stage LSTM and Incremental Created Hybrid Features." Electronics 12, no. 4 (February 15, 2023): 956. http://dx.doi.org/10.3390/electronics12040956.
Full textKim, Taehoon, and Wooguil Pak. "Integrated Feature-Based Network Intrusion Detection System Using Incremental Feature Generation." Electronics 12, no. 7 (March 31, 2023): 1657. http://dx.doi.org/10.3390/electronics12071657.
Full textYang, Hao, Jinyan Xu, Yongcai Xiao, and Lei Hu. "SPE-ACGAN: A Resampling Approach for Class Imbalance Problem in Network Intrusion Detection Systems." Electronics 12, no. 15 (August 3, 2023): 3323. http://dx.doi.org/10.3390/electronics12153323.
Full textWang, Minxiao, Ning Yang, and Ning Weng. "Securing a Smart Home with a Transformer-Based IoT Intrusion Detection System." Electronics 12, no. 9 (May 4, 2023): 2100. http://dx.doi.org/10.3390/electronics12092100.
Full textWang, Zhen Qi, and Dan Kai Zhang. "HIDS and NIDS Hybrid Intrusion Detection System Model Design." Advanced Engineering Forum 6-7 (September 2012): 991–94. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.991.
Full textWang, Yunhui, Zifei Liu, Weichu Zheng, Jinyan Wang, Hongjian Shi, and Mingyu Gu. "A Combined Multi-Classification Network Intrusion Detection System Based on Feature Selection and Neural Network Improvement." Applied Sciences 13, no. 14 (July 18, 2023): 8307. http://dx.doi.org/10.3390/app13148307.
Full textXu, J., and C. R. Shelton. "Intrusion Detection using Continuous Time Bayesian Networks." Journal of Artificial Intelligence Research 39 (December 23, 2010): 745–74. http://dx.doi.org/10.1613/jair.3050.
Full textFigueiredo, João, Carlos Serrão, and Ana Maria de Almeida. "Deep Learning Model Transposition for Network Intrusion Detection Systems." Electronics 12, no. 2 (January 6, 2023): 293. http://dx.doi.org/10.3390/electronics12020293.
Full textSong, Youngrok, Sangwon Hyun, and Yun-Gyung Cheong. "Analysis of Autoencoders for Network Intrusion Detection." Sensors 21, no. 13 (June 23, 2021): 4294. http://dx.doi.org/10.3390/s21134294.
Full textLama, Amin, and Dr Preeti Savant. "A SURVEY ON NETWORK-BASED INTRUSION DETECTION SYSTEMS USING MACHINE LEARNING ALGORITHMS." International Journal of Engineering Applied Sciences and Technology 6, no. 9 (January 1, 2022): 225–30. http://dx.doi.org/10.33564/ijeast.2022.v06i09.031.
Full textSong, Jiaming, Xiaojuan Wang, Mingshu He, and Lei Jin. "CSK-CNN: Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset." Information 14, no. 2 (February 16, 2023): 130. http://dx.doi.org/10.3390/info14020130.
Full textKim, Taehoon, and Wooguil Pak. "Scalable Inline Network-Intrusion Detection System with Minimized Memory Requirement." Electronics 12, no. 9 (April 29, 2023): 2061. http://dx.doi.org/10.3390/electronics12092061.
Full textAl Lail, Mustafa, Alejandro Garcia, and Saul Olivo. "Machine Learning for Network Intrusion Detection—A Comparative Study." Future Internet 15, no. 7 (July 16, 2023): 243. http://dx.doi.org/10.3390/fi15070243.
Full textHussien et al., Zaid. "Anomaly Detection Approach Based on Deep Neural Network and Dropout." Baghdad Science Journal 17, no. 2(SI) (June 23, 2020): 0701. http://dx.doi.org/10.21123/bsj.2020.17.2(si).0701.
Full textImtiaz, Syed Ibrahim, Liaqat Ali Khan, Ahmad S. Almadhor, Sidra Abbas, Shtwai Alsubai, Michal Gregus, and Zunera Jalil. "Efficient Approach for Anomaly Detection in Internet of Things Traffic Using Deep Learning." Wireless Communications and Mobile Computing 2022 (September 10, 2022): 1–15. http://dx.doi.org/10.1155/2022/8266347.
Full textAhmed, Hafiza Anisa, Anum Hameed, and Narmeen Zakaria Bawany. "Network intrusion detection using oversampling technique and machine learning algorithms." PeerJ Computer Science 8 (January 7, 2022): e820. http://dx.doi.org/10.7717/peerj-cs.820.
Full textMijalkovic, Jovana, and Angelo Spognardi. "Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems." Algorithms 15, no. 8 (July 26, 2022): 258. http://dx.doi.org/10.3390/a15080258.
Full textLi, Guoquan, Zheng Yan, Yulong Fu, and Hanlu Chen. "Data Fusion for Network Intrusion Detection: A Review." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/8210614.
Full textMoraboena, Srikanthyadav, Gayatri Ketepalli, and Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder." Revue d'Intelligence Artificielle 34, no. 4 (September 30, 2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Full textAlshahrani, Ebtihaj, Daniyal Alghazzawi, Reem Alotaibi, and Osama Rabie. "Adversarial attacks against supervised machine learning based network intrusion detection systems." PLOS ONE 17, no. 10 (October 14, 2022): e0275971. http://dx.doi.org/10.1371/journal.pone.0275971.
Full textAhmed, Naveed, Asri bin Ngadi, Johan Mohamad Sharif, Saddam Hussain, Mueen Uddin, Muhammad Siraj Rathore, Jawaid Iqbal, et al. "Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction." Sensors 22, no. 20 (October 17, 2022): 7896. http://dx.doi.org/10.3390/s22207896.
Full textWanjau, Stephen Kahara, Geoffrey Mariga Wambugu, and Aaron Mogeni Oirere. "Network Intrusion Detection Systems: A Systematic Literature Review o f Hybrid Deep Learning Approaches." International Journal of Emerging Science and Engineering 10, no. 7 (June 30, 2022): 1–16. http://dx.doi.org/10.35940/ijese.f2530.0610722.
Full textLi, Xiaonan, Hossein Ghodosi, Chao Chen, Mangalam Sankupellay, and Ickjai Lee. "Improving Network-Based Anomaly Detection in Smart Home Environment." Sensors 22, no. 15 (July 27, 2022): 5626. http://dx.doi.org/10.3390/s22155626.
Full textAlzahrani, Abdulsalam O., and Mohammed J. F. Alenazi. "Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks." Future Internet 13, no. 5 (April 28, 2021): 111. http://dx.doi.org/10.3390/fi13050111.
Full textM. Banadaki, Yaser. "Evaluating the performance of machine learning algorithms for network intrusion detection systems in the internet of things infrastructure." Journal of Advanced Computer Science & Technology 9, no. 1 (September 19, 2020): 14. http://dx.doi.org/10.14419/jacst.v9i1.30992.
Full textGhawade, Miss Manoshri A. "Study of Intrusion Detection System." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 788–92. http://dx.doi.org/10.22214/ijraset.2021.34935.
Full textUsman, Saifudin, Idris Winarno, and Amang Sudarsono. "SDN-Based Network Intrusion Detection as DDoS defense system for Virtualization Environment." EMITTER International Journal of Engineering Technology 9, no. 2 (December 30, 2021): 252–67. http://dx.doi.org/10.24003/emitter.v9i2.616.
Full textde Caldas Filho, Francisco Lopes, Samuel Carlos Meneses Soares, Elder Oroski, Robson de Oliveira Albuquerque, Rafael Zerbini Alves da Mata, Fábio Lúcio Lopes de Mendonça, and Rafael Timóteo de Sousa Júnior. "Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning." Sensors 23, no. 14 (July 11, 2023): 6305. http://dx.doi.org/10.3390/s23146305.
Full textAnjum, Naveed, Zohaib Latif, Choonhwa Lee, Ijaz Ali Shoukat, and Umer Iqbal. "MIND: A Multi-Source Data Fusion Scheme for Intrusion Detection in Networks." Sensors 21, no. 14 (July 20, 2021): 4941. http://dx.doi.org/10.3390/s21144941.
Full textde Carvalho Bertoli, Gustavo, Lourenço Alves Pereira Júnior, and Osamu Saotome. "Improving detection of scanning attacks on heterogeneous networks with Federated Learning." ACM SIGMETRICS Performance Evaluation Review 49, no. 4 (June 2, 2022): 118–23. http://dx.doi.org/10.1145/3543146.3543172.
Full textde Carvalho Bertoli, Gustavo, Lourenço Alves Pereira Júnior, and Osamu Saotome. "Improving detection of scanning attacks on heterogeneous networks with Federated Learning." ACM SIGMETRICS Performance Evaluation Review 49, no. 4 (June 2, 2022): 118–23. http://dx.doi.org/10.1145/3543146.3543172.
Full textLu, Chunlin, Yue Li, Mingjie Ma, and Na Li. "A Hybrid NIDS Model Using Artificial Neural Network and D-S Evidence." International Journal of Digital Crime and Forensics 8, no. 1 (January 2016): 37–50. http://dx.doi.org/10.4018/ijdcf.2016010103.
Full textImrana, Yakubu, Yanping Xiang, Liaqat Ali, Zaharawu Abdul-Rauf, Yu-Chen Hu, Seifedine Kadry, and Sangsoon Lim. "χ2-BidLSTM: A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM." Sensors 22, no. 5 (March 4, 2022): 2018. http://dx.doi.org/10.3390/s22052018.
Full textKarimov, M., and M. Sagatov. "Application the Aho-Corasick Algorithm for Improving a Intrusion Detection System." Mathematical and computer modelling. Series: Technical sciences, no. 22 (November 26, 2021): 67–76. http://dx.doi.org/10.32626/2308-5916.2021-22.67-76.
Full textDutta, Vibekananda, Michał Choraś, Marek Pawlicki, and Rafał Kozik. "Detection of Cyberattacks Traces in IoT Data." JUCS - Journal of Universal Computer Science 26, no. 11 (November 28, 2020): 1422–34. http://dx.doi.org/10.3897/jucs.2020.075.
Full textSong, Jian Hao, Gang Zhao, and Jun Yi Song. "Research on Property and Model Optimization of Multiclass SVM for NIDS." Applied Mechanics and Materials 347-350 (August 2013): 3696–701. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3696.
Full textSienna Arscott. "Intrusion Detection Technique for Security Statistics." Mathematical Statistician and Engineering Applications 67, no. 1 (December 31, 2018): 01–08. http://dx.doi.org/10.17762/msea.v67i1.1.
Full textVinayakumar R, Soman KP, and Prabaharan Poornachandran. "A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs)." International Journal of Digital Crime and Forensics 11, no. 3 (July 2019): 65–89. http://dx.doi.org/10.4018/ijdcf.2019070104.
Full textPitafi, Shahneela, Toni Anwar, and Zubair Sharif. "An Improved Approach Based on Density-Based Spatial Clustering of Applications with a Noise Algorithm for Intrusion Detection." Journal of Hunan University Natural Sciences 49, no. 12 (December 30, 2022): 67–77. http://dx.doi.org/10.55463/issn.1674-2974.49.12.7.
Full textAlabdulatif, Abdulatif, and Sajjad Hussain Rizvi. "Network intrusion detection system using an optimized machine learning algorithm." Mehran University Research Journal of Engineering and Technology 42, no. 1 (January 1, 2023): 153. http://dx.doi.org/10.22581/muet1982.2301.14.
Full textYuvaraja, M., S. Arunkumar, P. Vinodh Kumar, and L. Mary Immaculate Sheela. "Improved Grey Wolf Optimization- (IGWO-) Based Feature Selection on Multiview Features and Enhanced Multimodal-Sequential Network Intrusion Detection Approach." Wireless Communications and Mobile Computing 2023 (February 1, 2023): 1–13. http://dx.doi.org/10.1155/2023/8478457.
Full textZhong, Shao Hong, Hua Jun Huang, and Ai Bin Chen. "An Effective Intrusion Detection Model Based on Random Forest and Neural Networks." Advanced Materials Research 267 (June 2011): 308–13. http://dx.doi.org/10.4028/www.scientific.net/amr.267.308.
Full textAbu Al-Haija, Qasem, and Ahmad Al-Badawi. "Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning." Sensors 22, no. 1 (December 29, 2021): 241. http://dx.doi.org/10.3390/s22010241.
Full textHagar, Abdulnaser A., and Bharti W. Gawali. "Apache Spark and Deep Learning Models for High-Performance Network Intrusion Detection Using CSE-CIC-IDS2018." Computational Intelligence and Neuroscience 2022 (August 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/3131153.
Full textSaputra, Ferry Astika, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori, and Kalamullah Ramli. "The Next-Generation NIDS Platform: Cloud-Based Snort NIDS Using Containers and Big Data." Big Data and Cognitive Computing 6, no. 1 (February 7, 2022): 19. http://dx.doi.org/10.3390/bdcc6010019.
Full text