[PDF][PDF] Intrusion detection using machine learning: A comparison study

SK Biswas - International Journal of pure and applied mathematics, 2018 - academia.edu
With the advancement of internet over years, the number of attacks over internet has also
increased. A powerful Intrusion Detection System (IDS) is required to ensure the security of a …

User interface and workflow for performing machine learning

P DiCorpo, SS Sawant, S Kauffman… - US Patent …, 2014 - Google Patents
US8682814B2 - User interface and workflow for performing machine learning - Google
Patents US8682814B2 - User interface and workflow for performing machine learning …

Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components

I Ahmad, M Hussain, A Alghamdi, A Alelaiwi - Neural computing and …, 2014 - Springer
Intrusion detection is very serious issue in these days because the prevention of intrusions
depends on detection. Therefore, accurate detection of intrusion is very essential to secure …

Real time detection of phishing websites

AA Ahmed, NA Abdullah - 2016 IEEE 7th Annual Information …, 2016 - ieeexplore.ieee.org
Web Spoofing lures the user to interact with the fake websites rather than the real ones. The
main objective of this attack is to steal the sensitive information from the users. The attacker …

Machine learning with blockchain for secure e-voting system

MA Cheema, N Ashraf, A Aftab… - … conference of smart …, 2020 - ieeexplore.ieee.org
Voting is a central component of a country's political life cycle. Privacy, authentication and
integrity of citizens' votes and their data are considered to be essential to any e-voting …

A comparative study of data mining algorithms for high detection rate in intrusion detection system

N Ashraf, W Ahmad, R Ashraf - Annals of Emerging Technologies …, 2018 - papers.ssrn.com
Due to the fast growth and tradition of the internet over the last decades, the network security
problems are increasing vigorously. Humans can not handle the speed of processes and the …

Comparison of machine learning algorithms performance in detecting network intrusion

K Abd Jalil, MH Kamarudin… - … on networking and …, 2010 - ieeexplore.ieee.org
Organization has come to realize that network security technology has become very
important in protecting its information. With tremendous growth of internet, attack cases are …

Building a fuzzy classifier based on whale optimization algorithm to detect network intrusions

N Koryshev, I Hodashinsky, A Shelupanov - Symmetry, 2021 - mdpi.com
The quantity of network attacks and the harm from them is constantly increasing, so the
detection of these attacks is an urgent task in the information security field. In this paper, we …

Non-invasive hypoglycemia monitoring system using extreme learning machine for Type 1 diabetes

SH Ling, PP San, HT Nguyen - ISA transactions, 2016 - Elsevier
Hypoglycemia is a very common in type 1 diabetic persons and can occur at any age. It is
always threatening to the well-being of patients with Type 1 diabetes mellitus (T1DM) since …

An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network

RMA Saad, M Anbar, S Manickam… - IETE Technical …, 2016 - Taylor & Francis
IPv6 was designed to solve the issue of adopting IPv4 addresses by presenting a large
number of address spaces. Currently, many networking devices consider IPv6 as a …