Feature selection method for nonintrusive load monitoring with balanced redundancy and relevancy

S Bao, L Zhang, X Han, W Li, D Sun… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Nonintrusive load monitoring (NILM) has become a key technology in the power Internet of
Things as well as an important information source for load characteristics analysis. Whether …

[PDF][PDF] 入侵检测中基于SVM 的两级特征选择方法

武小年, 彭小金, 杨宇洋, 方堃 - 通信学报, 2015 - infocomm-journal.com
针对入侵检测中的特征优化选择问题, 提出基于支持向量机的两级特征选择方法.
该方法将基于检测率与误报率比值的特征评测值作为特征筛选的评价指标, 先采用过滤模式中的 …

Kappa-PSO-FAN based method for damage identification on composite structural health monitoring

MA de Oliveira, NVS Araujo, DJ Inman… - Expert Systems with …, 2018 - Elsevier
Recently much research has been conducted towards finding fast and accurate pattern
classifiers applied to Structural Health Monitoring (SHM) systems. In this way, researchers …

Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11 w data base

DWFL Vilela, ADP Lotufo… - 2018 International Joint …, 2018 - ieeexplore.ieee.org
In the latest years, the network computers and computational systems are receiving several
cyber-attacks that affect its security. This issue is pushing researches at intrusion detection …

Mixed Feature Selection Method Based on SVM

H Lei, X Gao - … Conference on Applications and Techniques in Cyber …, 2019 - Springer
Aiming at feature selection in network traffic classification, a mixed feature selection
algorithm based on SVM was proposed. This method uses the eigenvalues based on the …

[PDF][PDF] Desenvolvimento de IDS Baseado no Modelo de RNA ARTMAP Fuzzy como Ferramenta de Segurança em Redes Wi-Fi

DWFL Vilela - 2021 - repositorio.unesp.br
As redes de comunicação sem fio IEEE 802.11 possuem diversas vulnerabilidades, e os
ataques de negação de serviço são considerados uma das suas principais ameaças. A …

[PDF][PDF] A Methodology for building a Dataset to Assess Intrusion Detection Systems in Wireless Networks

VE NASCIMENTO, NVDES ARAÚJO - researchgate.net
this paper proposes building a dataset to be used in evaluation of Intrusion Detection
Systems (IDS). We collected traffic in a real wireless network, processed such data and then …