Machine learning and deep learning methods for cybersecurity

Y Xin, L Kong, Z Liu, Y Chen, Y Li, H Zhu, M Gao… - Ieee …, 2018 - ieeexplore.ieee.org
With the development of the Internet, cyber-attacks are changing rapidly and the cyber
security situation is not optimistic. This survey report describes key literature surveys on …

Modified stacking ensemble approach to detect network intrusion

N Demir, G Dalkiliç - Turkish Journal of Electrical Engineering …, 2018 - journals.tubitak.gov.tr
Detecting intrusions in a network traffic has remained an issue for researchers over the
years. Advances in the area of machine learning provide opportunities to researchers to …

[PDF][PDF] Genetic algorithm to solve the problem of small disjunct in the decision tree based intrusion detection system

C Azad, VK Jha - International Journal of Computer Network and …, 2015 - Citeseer
Intrusion detection system is the most important part of the network security system because
the volume of unauthorized access to the network resources and services increase day by …

Decision tree and genetic algorithm based intrusion detection system

C Azad, VK Jha - Proceeding of the second international conference on …, 2019 - Springer
Today's computer network security systems like IDS, firewall, access control, etc., are not yet
100% trusted, Still they are suffering from the high classification error. Therefore, there is …

[HTML][HTML] 基于多块相对变换独立主元分析的故障诊断方法

石怀涛, 王雨桐, 李颂华, 刘建昌, 岳国栋, 孙宏辉 - 控制与决策, 2018 - kzyjc.alljournals.cn
针对复杂工业过程中故障诊断技术存在数据可分性差, 噪声干扰, 故障定位困难的问题,
提出一种基于多块相对变换独立主元分析(MBRTICA) 的故障诊断方法. 为了使所提取的故障 …

[图书][B] Automated code compliance checking in the construction domain using semantic natural language processing and logic-based reasoning

J Zhang - 2015 - search.proquest.com
Construction projects must comply with various regulations. The manual process of checking
the compliance with regulations is costly, time consuming, and error prone. With the …