TA Tuan, HV Long, LH Son, R Kumar… - … Intelligence, 2020 - Springer
… solution proposed was not optimal and there were scalability … machinelearning methods that are highly scalable. In order to conduct the performanceevaluation, we outline a framework …
… However, this work merged all attacks into one label as the goal is to detect an attack … and the UNSW-NB 2015 dataset) for performanceevaluation, this work first studied the impact of …
D Han, Z Wang, Y Zhong, W Chen… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
… novel practical adversarial attack by formulating it as a bi-level optimization problem with a … combinatorial optimization task (NP-complete). Hence, we resort to swarm intelligence algo…
… of various attacks using intelligent ML algorithms. ML can be explained as improving the learning … In order to produce the optimal predictive model, this ML technique combines several …
… features of the attacks in the dataset. We used PSO which is a metaheuristic optimization algorithm for … IT Tosin, and AN Babatunde, ‘‘Student’s performanceanalysis using decision tree …
Ü Çavuşoğlu - Applied Intelligence, 2019 - Springer
… machinelearning algorithms according to different attack … Then, the subset which may have optimumperformance from … , the evaluation criteria used for performanceevaluation are …
… The learningperformanceevaluation can be shown in the … more effectively combine the network anomaly-based IDS with an intelligent host-based IDS that works based on the log host […
… optimized using the Fruitfly algorithm. Using data from the NSL-KDD and UNSW-NB15 datasets, the evaluation … The performanceevaluation demonstrated that the accuracy increased …
… an attack if it missed the first packets of the attack broadcast. … } is an essential task for performanceevaluation of an anomaly … as an optimization algorithm to find the optimal value of the …