Artificial neural networks for educational data mining in higher education: A systematic literature review

E Okewu, P Adewole, S Misra… - Applied Artificial …, 2021 - Taylor & Francis
Efforts to raise the bar of higher education so as to respond to dynamic societal/industry
needs have led to a number of initiatives, including artificial neural network (ANN) based …

Dynamic selection of classifiers—a comprehensive review

AS Britto Jr, R Sabourin, LES Oliveira - Pattern recognition, 2014 - Elsevier
This work presents a literature review of multiple classifier systems based on the dynamic
selection of classifiers. First, it briefly reviews some basic concepts and definitions related to …

A stacking ensemble for network intrusion detection using heterogeneous datasets

S Rajagopal, PP Kundapur… - Security and …, 2020 - Wiley Online Library
The problem of network intrusion detection poses innumerable challenges to the research
community, industry, and commercial sectors. Moreover, the persistent attacks occurring on …

Towards effective network intrusion detection: from concept to creation on Azure cloud

S Rajagopal, PP Kundapur, KS Hareesha - IEEE Access, 2021 - ieeexplore.ieee.org
Network Intrusion Detection is one of the most researched topics in the field of computer
security. Hacktivists use sophisticated tools to launch numerous attacks that hamper the …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review

G Kumar, K Thakur, MR Ayyagari - The Journal of Supercomputing, 2020 - Springer
Network security plays an essential role in secure communication and avoids financial loss
and crippled services due to network intrusions. Intruders generally exploit the flaws of …

Research of machine learning algorithms for the development of intrusion detection systems in 5G mobile networks and beyond

A Imanbayev, S Tynymbayev, R Odarchenko… - Sensors, 2022 - mdpi.com
The introduction of fifth generation mobile networks is underway all over the world which
makes many people think about the security of the network from any hacking. Over the past …

A soft-voting ensemble based co-training scheme using static selection for binary classification problems

S Karlos, G Kostopoulos, S Kotsiantis - Algorithms, 2020 - mdpi.com
In recent years, a forward-looking subfield of machine learning has emerged with important
applications in a variety of scientific fields. Semi-supervised learning is increasingly being …

Anomaly detection method for vehicular network based on collaborative deep support vector data description

J Mai, Y Wu, Z Liu, J Guo, Z Ying, X Chen, S Cui - Physical Communication, 2023 - Elsevier
With the accelerating convergence of fifth-generation (5G) communication technology and
the automotive industry, vehicular network has received wide attention due to its great …

A semi-boosted nested model with sensitivity-based weighted binarization for multi-domain network intrusion detection

JW Mikhail, JM Fossaceca, R Iammartino - ACM Transactions on …, 2019 - dl.acm.org
Effective network intrusion detection techniques are required to thwart evolving
cybersecurity threats. Historically, traditional enterprise networks have been researched …