Journal articles on the topic 'Network Intrusion Detection Systems (NIDS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network Intrusion Detection Systems (NIDS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kumar, Satish, Sunanda Gupta, and Sakshi Arora. "A comparative simulation of normalization methods for machine learning-based intrusion detection systems using KDD Cup’99 dataset." Journal of Intelligent & Fuzzy Systems 42, no. 3 (2022): 1749–66. http://dx.doi.org/10.3233/jifs-211191.
Full textMulyanto, Mulyanto, Muhamad Faisal, Setya Widyawan Prakosa, and Jenq-Shiou Leu. "Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems." Symmetry 13, no. 1 (2020): 4. http://dx.doi.org/10.3390/sym13010004.
Full textHu, Qinwen, Muhammad Rizwan Asghar, and Nevil Brownlee. "Effectiveness of Intrusion Detection Systems in High-speed Networks." International Journal of Information, Communication Technology and Applications 4, no. 1 (2018): 1–10. http://dx.doi.org/10.17972/ijicta20184138.
Full textAlbasheer, Hashim, Maheyzah Md Siraj, Azath Mubarakali, et al. "Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey." Sensors 22, no. 4 (2022): 1494. http://dx.doi.org/10.3390/s22041494.
Full textHan, Jonghoo, and Wooguil Pak. "Hierarchical LSTM-Based Network Intrusion Detection System Using Hybrid Classification." Applied Sciences 13, no. 5 (2023): 3089. http://dx.doi.org/10.3390/app13053089.
Full textHan, Jonghoo, and Wooguil Pak. "High Performance Network Intrusion Detection System Using Two-Stage LSTM and Incremental Created Hybrid Features." Electronics 12, no. 4 (2023): 956. http://dx.doi.org/10.3390/electronics12040956.
Full textKim, Taehoon, and Wooguil Pak. "Integrated Feature-Based Network Intrusion Detection System Using Incremental Feature Generation." Electronics 12, no. 7 (2023): 1657. http://dx.doi.org/10.3390/electronics12071657.
Full textYang, Hao, Jinyan Xu, Yongcai Xiao, and Lei Hu. "SPE-ACGAN: A Resampling Approach for Class Imbalance Problem in Network Intrusion Detection Systems." Electronics 12, no. 15 (2023): 3323. http://dx.doi.org/10.3390/electronics12153323.
Full textWang, Minxiao, Ning Yang, and Ning Weng. "Securing a Smart Home with a Transformer-Based IoT Intrusion Detection System." Electronics 12, no. 9 (2023): 2100. http://dx.doi.org/10.3390/electronics12092100.
Full textWang, Zhen Qi, and Dan Kai Zhang. "HIDS and NIDS Hybrid Intrusion Detection System Model Design." Advanced Engineering Forum 6-7 (September 2012): 991–94. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.991.
Full textWang, Yunhui, Zifei Liu, Weichu Zheng, Jinyan Wang, Hongjian Shi, and Mingyu Gu. "A Combined Multi-Classification Network Intrusion Detection System Based on Feature Selection and Neural Network Improvement." Applied Sciences 13, no. 14 (2023): 8307. http://dx.doi.org/10.3390/app13148307.
Full textXu, J., and C. R. Shelton. "Intrusion Detection using Continuous Time Bayesian Networks." Journal of Artificial Intelligence Research 39 (December 23, 2010): 745–74. http://dx.doi.org/10.1613/jair.3050.
Full textFigueiredo, João, Carlos Serrão, and Ana Maria de Almeida. "Deep Learning Model Transposition for Network Intrusion Detection Systems." Electronics 12, no. 2 (2023): 293. http://dx.doi.org/10.3390/electronics12020293.
Full textSong, Youngrok, Sangwon Hyun, and Yun-Gyung Cheong. "Analysis of Autoencoders for Network Intrusion Detection." Sensors 21, no. 13 (2021): 4294. http://dx.doi.org/10.3390/s21134294.
Full textLama, Amin, and Dr Preeti Savant. "A SURVEY ON NETWORK-BASED INTRUSION DETECTION SYSTEMS USING MACHINE LEARNING ALGORITHMS." International Journal of Engineering Applied Sciences and Technology 6, no. 9 (2022): 225–30. http://dx.doi.org/10.33564/ijeast.2022.v06i09.031.
Full textSong, Jiaming, Xiaojuan Wang, Mingshu He, and Lei Jin. "CSK-CNN: Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset." Information 14, no. 2 (2023): 130. http://dx.doi.org/10.3390/info14020130.
Full textKim, Taehoon, and Wooguil Pak. "Scalable Inline Network-Intrusion Detection System with Minimized Memory Requirement." Electronics 12, no. 9 (2023): 2061. http://dx.doi.org/10.3390/electronics12092061.
Full textAl Lail, Mustafa, Alejandro Garcia, and Saul Olivo. "Machine Learning for Network Intrusion Detection—A Comparative Study." Future Internet 15, no. 7 (2023): 243. http://dx.doi.org/10.3390/fi15070243.
Full textHussien et al., Zaid. "Anomaly Detection Approach Based on Deep Neural Network and Dropout." Baghdad Science Journal 17, no. 2(SI) (2020): 0701. http://dx.doi.org/10.21123/bsj.2020.17.2(si).0701.
Full textImtiaz, Syed Ibrahim, Liaqat Ali Khan, Ahmad S. Almadhor, et al. "Efficient Approach for Anomaly Detection in Internet of Things Traffic Using Deep Learning." Wireless Communications and Mobile Computing 2022 (September 10, 2022): 1–15. http://dx.doi.org/10.1155/2022/8266347.
Full textAhmed, Hafiza Anisa, Anum Hameed, and Narmeen Zakaria Bawany. "Network intrusion detection using oversampling technique and machine learning algorithms." PeerJ Computer Science 8 (January 7, 2022): e820. http://dx.doi.org/10.7717/peerj-cs.820.
Full textMijalkovic, Jovana, and Angelo Spognardi. "Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems." Algorithms 15, no. 8 (2022): 258. http://dx.doi.org/10.3390/a15080258.
Full textLi, Guoquan, Zheng Yan, Yulong Fu, and Hanlu Chen. "Data Fusion for Network Intrusion Detection: A Review." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/8210614.
Full textMoraboena, Srikanthyadav, Gayatri Ketepalli, and Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder." Revue d'Intelligence Artificielle 34, no. 4 (2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Full textAlshahrani, Ebtihaj, Daniyal Alghazzawi, Reem Alotaibi, and Osama Rabie. "Adversarial attacks against supervised machine learning based network intrusion detection systems." PLOS ONE 17, no. 10 (2022): e0275971. http://dx.doi.org/10.1371/journal.pone.0275971.
Full textAhmed, Naveed, Asri bin Ngadi, Johan Mohamad Sharif, et al. "Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction." Sensors 22, no. 20 (2022): 7896. http://dx.doi.org/10.3390/s22207896.
Full textWanjau, Stephen Kahara, Geoffrey Mariga Wambugu, and Aaron Mogeni Oirere. "Network Intrusion Detection Systems: A Systematic Literature Review o f Hybrid Deep Learning Approaches." International Journal of Emerging Science and Engineering 10, no. 7 (2022): 1–16. http://dx.doi.org/10.35940/ijese.f2530.0610722.
Full textLi, Xiaonan, Hossein Ghodosi, Chao Chen, Mangalam Sankupellay, and Ickjai Lee. "Improving Network-Based Anomaly Detection in Smart Home Environment." Sensors 22, no. 15 (2022): 5626. http://dx.doi.org/10.3390/s22155626.
Full textAlzahrani, Abdulsalam O., and Mohammed J. F. Alenazi. "Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks." Future Internet 13, no. 5 (2021): 111. http://dx.doi.org/10.3390/fi13050111.
Full textM. Banadaki, Yaser. "Evaluating the performance of machine learning algorithms for network intrusion detection systems in the internet of things infrastructure." Journal of Advanced Computer Science & Technology 9, no. 1 (2020): 14. http://dx.doi.org/10.14419/jacst.v9i1.30992.
Full textGhawade, Miss Manoshri A. "Study of Intrusion Detection System." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 788–92. http://dx.doi.org/10.22214/ijraset.2021.34935.
Full textUsman, Saifudin, Idris Winarno, and Amang Sudarsono. "SDN-Based Network Intrusion Detection as DDoS defense system for Virtualization Environment." EMITTER International Journal of Engineering Technology 9, no. 2 (2021): 252–67. http://dx.doi.org/10.24003/emitter.v9i2.616.
Full textde Caldas Filho, Francisco Lopes, Samuel Carlos Meneses Soares, Elder Oroski, et al. "Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning." Sensors 23, no. 14 (2023): 6305. http://dx.doi.org/10.3390/s23146305.
Full textAnjum, Naveed, Zohaib Latif, Choonhwa Lee, Ijaz Ali Shoukat, and Umer Iqbal. "MIND: A Multi-Source Data Fusion Scheme for Intrusion Detection in Networks." Sensors 21, no. 14 (2021): 4941. http://dx.doi.org/10.3390/s21144941.
Full textde Carvalho Bertoli, Gustavo, Lourenço Alves Pereira Júnior, and Osamu Saotome. "Improving detection of scanning attacks on heterogeneous networks with Federated Learning." ACM SIGMETRICS Performance Evaluation Review 49, no. 4 (2022): 118–23. http://dx.doi.org/10.1145/3543146.3543172.
Full textde Carvalho Bertoli, Gustavo, Lourenço Alves Pereira Júnior, and Osamu Saotome. "Improving detection of scanning attacks on heterogeneous networks with Federated Learning." ACM SIGMETRICS Performance Evaluation Review 49, no. 4 (2022): 118–23. http://dx.doi.org/10.1145/3543146.3543172.
Full textLu, Chunlin, Yue Li, Mingjie Ma, and Na Li. "A Hybrid NIDS Model Using Artificial Neural Network and D-S Evidence." International Journal of Digital Crime and Forensics 8, no. 1 (2016): 37–50. http://dx.doi.org/10.4018/ijdcf.2016010103.
Full textImrana, Yakubu, Yanping Xiang, Liaqat Ali та ін. "χ2-BidLSTM: A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM". Sensors 22, № 5 (2022): 2018. http://dx.doi.org/10.3390/s22052018.
Full textKarimov, M., and M. Sagatov. "Application the Aho-Corasick Algorithm for Improving a Intrusion Detection System." Mathematical and computer modelling. Series: Technical sciences, no. 22 (November 26, 2021): 67–76. http://dx.doi.org/10.32626/2308-5916.2021-22.67-76.
Full textDutta, Vibekananda, Michał Choraś, Marek Pawlicki, and Rafał Kozik. "Detection of Cyberattacks Traces in IoT Data." JUCS - Journal of Universal Computer Science 26, no. 11 (2020): 1422–34. http://dx.doi.org/10.3897/jucs.2020.075.
Full textSong, Jian Hao, Gang Zhao, and Jun Yi Song. "Research on Property and Model Optimization of Multiclass SVM for NIDS." Applied Mechanics and Materials 347-350 (August 2013): 3696–701. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3696.
Full textSienna Arscott. "Intrusion Detection Technique for Security Statistics." Mathematical Statistician and Engineering Applications 67, no. 1 (2018): 01–08. http://dx.doi.org/10.17762/msea.v67i1.1.
Full textVinayakumar R, Soman KP, and Prabaharan Poornachandran. "A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs)." International Journal of Digital Crime and Forensics 11, no. 3 (2019): 65–89. http://dx.doi.org/10.4018/ijdcf.2019070104.
Full textPitafi, Shahneela, Toni Anwar, and Zubair Sharif. "An Improved Approach Based on Density-Based Spatial Clustering of Applications with a Noise Algorithm for Intrusion Detection." Journal of Hunan University Natural Sciences 49, no. 12 (2022): 67–77. http://dx.doi.org/10.55463/issn.1674-2974.49.12.7.
Full textAlabdulatif, Abdulatif, and Sajjad Hussain Rizvi. "Network intrusion detection system using an optimized machine learning algorithm." Mehran University Research Journal of Engineering and Technology 42, no. 1 (2023): 153. http://dx.doi.org/10.22581/muet1982.2301.14.
Full textYuvaraja, M., S. Arunkumar, P. Vinodh Kumar, and L. Mary Immaculate Sheela. "Improved Grey Wolf Optimization- (IGWO-) Based Feature Selection on Multiview Features and Enhanced Multimodal-Sequential Network Intrusion Detection Approach." Wireless Communications and Mobile Computing 2023 (February 1, 2023): 1–13. http://dx.doi.org/10.1155/2023/8478457.
Full textZhong, Shao Hong, Hua Jun Huang, and Ai Bin Chen. "An Effective Intrusion Detection Model Based on Random Forest and Neural Networks." Advanced Materials Research 267 (June 2011): 308–13. http://dx.doi.org/10.4028/www.scientific.net/amr.267.308.
Full textAbu Al-Haija, Qasem, and Ahmad Al-Badawi. "Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning." Sensors 22, no. 1 (2021): 241. http://dx.doi.org/10.3390/s22010241.
Full textHagar, Abdulnaser A., and Bharti W. Gawali. "Apache Spark and Deep Learning Models for High-Performance Network Intrusion Detection Using CSE-CIC-IDS2018." Computational Intelligence and Neuroscience 2022 (August 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/3131153.
Full textSaputra, Ferry Astika, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori, and Kalamullah Ramli. "The Next-Generation NIDS Platform: Cloud-Based Snort NIDS Using Containers and Big Data." Big Data and Cognitive Computing 6, no. 1 (2022): 19. http://dx.doi.org/10.3390/bdcc6010019.
Full text