A survey of neural networks usage for intrusion detection systems

A Drewek-Ossowicka, M Pietrołaj… - Journal of Ambient …, 2021 - Springer
In recent years, advancements in the field of the artificial intelligence (AI) gained a huge
momentum due to the worldwide appliance of this technology by the industry. One of the …

Collaborative ensemble-learning based intrusion detection systems for clouds

P Mehetrey, B Shahriari, M Moh - … International Conference on …, 2016 - ieeexplore.ieee.org
Cloud computation has become prominent with seemingly unlimited amount of storage and
computation available to users. Yet, security is a major issue that hampers the growth of …

An outlier-based analysis for behaviour and anomaly identification on IoT sensors

FC Almeida, AE Guelfi, AAA Silva… - … Journal of Sensor …, 2022 - inderscienceonline.com
The pervasive nature of WSN-based IoT devices provides benefits for the industry,
healthcare, and other environments. Because of that, a secure network that identifies sensor …

Visual analytics for comparing the impact of outliers in k-means and k-medoids algorithm

K Rani - 2019 Amity international conference on artificial …, 2019 - ieeexplore.ieee.org
Clustering is an unsupervised machine learning approach which plays a great role in
assigning the data sets into specific clusters based upon some similarity or dissimilarity …

Anomaly detection of high-dimensional sparse data based on Ensemble Generative Adversarial Networks

W Chen, M Zhou, C Zhai, M Shen, P Lv… - … Conference on Big …, 2021 - ieeexplore.ieee.org
Anomaly detection has drawn public attentions in past decades. However, in a high-
dimensional sparse data space, anomaly detection still faces big challenges. In this paper …

Survey on machine learning algorithms as cloud service for CIDPS

I Avdagic, K Hajdarevic - 2017 25th Telecommunication Forum …, 2017 - ieeexplore.ieee.org
Today IT vendors and mail/web/internet providers put their cloud strategy in the first place.
Challenges such as data security, privacy protection, data access, storage model, lack of …

Anomaly detection of high-dimensional data based on Ensemble GANs with Dropout

W Chen, J Yao, M Zhou, J Li… - 2022 IEEE/ACM …, 2022 - ieeexplore.ieee.org
An unsupervised anomaly detection approach DGANs is proposed based on ensemble
GANs with Dropout. The comparisons with representative approaches on 10 public datasets …

An efficient network intrusion detection system based on fuzzy C-means and support vector machine

K Kumar - 2016 International Conference on Computer …, 2016 - ieeexplore.ieee.org
Need of effective and efficient Intrusion Detection System, used the concept of hybrid
approach in Iintrusion Detection System where many combination of different techniques …

K-Means and BIRCH: A Comparative Analysis Study

R Tomar, A Sharma - Inventive Communication and Computational …, 2022 - Springer
With the rise of the application of machine learning in academia and industrial sector,
clustering has become an important field of study. Clustering has been extensively used in …

[PDF][PDF] An image based microtiter plate reader system for 96-well format fluorescence assays

P Durai Arun, K Sankaran, S Muttan - Eur. J. Biomed. Inform …, 2013 - researchgate.net
Background: 96-well microtiter plate assay are becoming popular analytical procedures in
laboratory and clinical practices generating a demand for microtiter plate readers. The …