Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection

J Liu, W Zhang, Z Tang, Y Xie, T Ma, J Zhang… - Expert Systems with …, 2020 - Elsevier
In this paper, an adaptive network intrusion detection method using fuzzy rough set-based
feature selection and GA-GOGMM-based pattern learning is presented. Based on the fuzzy …

[HTML][HTML] A novel GPU based intrusion detection system using deep autoencoder with Fruitfly optimization

R Sekhar, K Sasirekha, PS Raja, K Thangavel - SN Applied Sciences, 2021 - Springer
Abstract Intrusion Detection Systems (IDSs) have received more attention to safeguarding
the vital information in a network system of an organization. Generally, the hackers are …

Fuzzy integrated rough set theory situation feature extraction of network security

D Zhao, H Song, H Li - Journal of Intelligent & Fuzzy Systems, 2021 - content.iospress.com
The element extraction from network security condition is the foundation security awareness.
Its excellence directly disturbsentire security system performance. In this paper we introduce …

A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network

M Prasad, S Tripathi, K Dahal - Applied Intelligence, 2023 - Springer
A mobile ad-hoc network is a small and temporary network. This network has a different
working principle and structure than wired networks. A source node transfers data to the …

An improved rough set theory based feature selection approach for intrusion detection in SCADA systems

S Priyanga, MR Gauthama Raman… - Journal of Intelligent …, 2019 - content.iospress.com
Despite the increasing awareness of cyber-attacks against Critical Infrastructure (CI),
safeguarding the Supervisory Control and Data Acquisition (SCADA) systems remains …

Intrusion detection using rough set classification

L Zhang, G Zhang, L Yu, J Zhang, Y Bai - Journal of Zhejiang University …, 2004 - Springer
Recently machine learning-based intrusion detection approaches have been subjected to
extensive researches because they can detect both misuse and anomaly. In this paper …

Designing of on line intrusion detection system using rough set theory and Q-learning algorithm

N Sengupta, J Sen, J Sil, M Saha - Neurocomputing, 2013 - Elsevier
Development of an efficient real time intrusion detection system (IDS) has been proposed in
the paper by integrating Q-learning algorithm and rough set theory (RST). The objective of …

A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem

MS Al-Daweri, S Abdullah, KAZ Ariffin - International Journal of Critical …, 2021 - Elsevier
Network security is a mechanism of protecting the usability and integrity of any given
network and its transmitted data. Network security's effectiveness is crucial to the network …

[HTML][HTML] An improved artificial immune system-based network intrusion detection by using rough set

J Shen, J Wang, H Ai - 2012 - scirp.org
With theincreasing worldwide network attacks, intrusion detection (ID) hasbecome a
popularresearch topic inlast decade. Several artificial intelligence techniques such as neural …

Intelligent intrusion detection for internet of things security: A deep convolutional generative adversarial network-enabled approach

Y Wu, L Nie, S Wang, Z Ning, S Li - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
With the rapid advance of Internet of Things (IoT), it is difficult for cloud-centric computing to
meet the requirements of low latency and ease of use. As an open and distributed system …