A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

R Boutaba, MA Salahuddin, N Limam, S Ayoubi… - Journal of Internet …, 2018 - Springer
Abstract Machine Learning (ML) has been enjoying an unprecedented surge in applications
that solve problems and enable automation in diverse domains. Primarily, this is due to the …

Dynamic classifier selection: Recent advances and perspectives

RMO Cruz, R Sabourin, GDC Cavalcanti - Information Fusion, 2018 - Elsevier
Abstract Multiple Classifier Systems (MCS) have been widely studied as an alternative for
increasing accuracy in pattern recognition. One of the most promising MCS approaches is …

A survey on machine learning for data fusion

T Meng, X Jing, Z Yan, W Pedrycz - Information Fusion, 2020 - Elsevier
Data fusion is a prevalent way to deal with imperfect raw data for capturing reliable, valuable
and accurate information. Comparing with a range of classical probabilistic data fusion …

TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system

BA Tama, M Comuzzi, KH Rhee - IEEE access, 2019 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) play a pivotal role in computer security by discovering
and repealing malicious activities in computer networks. Anomaly-based IDS, in particular …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

[图书][B] Ensemble methods: foundations and algorithms

ZH Zhou - 2012 - books.google.com
An up-to-date, self-contained introduction to a state-of-the-art machine learning approach,
Ensemble Methods: Foundations and Algorithms shows how these accurate methods are …

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

WC Lin, SW Ke, CF Tsai - Knowledge-based systems, 2015 - Elsevier
The aim of an intrusion detection systems (IDS) is to detect various types of malicious
network traffic and computer usage, which cannot be detected by a conventional firewall …

集成学习方法: 研究综述

徐继伟, 杨云 - 云南大学学报(自然科学版), 2018 - yndxxb.ynu.edu.cn
机器学习的求解过程可以看作是在假设空间中搜索一个具有强泛化能力和高鲁棒性的学习模型,
而在假设空间中寻找合适模型的过程是较为困难的. 然而, 集成学习作为一类组合优化的学习 …

Cloud-based cyber-physical intrusion detection for vehicles using deep learning

G Loukas, T Vuong, R Heartfield, G Sakellari… - Ieee …, 2017 - ieeexplore.ieee.org
Detection of cyber attacks against vehicles is of growing interest. As vehicles typically afford
limited processing resources, proposed solutions are rule-based or lightweight machine …

A survey of multiple classifier systems as hybrid systems

M Woźniak, M Grana, E Corchado - Information Fusion, 2014 - Elsevier
A current focus of intense research in pattern classification is the combination of several
classifier systems, which can be built following either the same or different models and/or …