[HTML][HTML] An intelligent model for online recruitment fraud detection

B Alghamdi, F Alharby - Journal of Information Security, 2019 - scirp.org
This study research attempts to prohibit privacy and loss of money for individuals and
organization by creating a reliable model which can detect the fraud exposure in the online …

A semi-boosted nested model with sensitivity-based weighted binarization for multi-domain network intrusion detection

JW Mikhail, JM Fossaceca, R Iammartino - ACM Transactions on …, 2019 - dl.acm.org
Effective network intrusion detection techniques are required to thwart evolving
cybersecurity threats. Historically, traditional enterprise networks have been researched …

[PDF][PDF] An adaptive distributed intrusion detection system architecture using multi agents

AM Riyad, MSI Ahmed, RLR Khan - International Journal of Electrical …, 2019 - academia.edu
Intrusion detection systems are used for monitoring the network data, analyze them and find
the intrusions if any. The major issues with these systems are the time taken for analysis …

Intrusion detection using error correcting output code based ensemble

SM AbdElrahman, A Abraham - 2014 14th International …, 2014 - ieeexplore.ieee.org
Intrusion Detection System is an essential part in computer security. Researchers have
proposed many methods but most of them suffer from low detection rates and high false …

[PDF][PDF] DYNAMIC ACCESS CONTROL AT THE NETWORK EDGE USING AN ADAPTIVE RISK-BASED ACCESS CONTROL SYSTEM (ad-RACs)

MB ALIYU, M GARBA, D GABI, HU SURU… - Journal of Theoretical …, 2024 - researchgate.net
The widespread adoption of edge computing models owes to their cost-effectiveness and
performance advantages for both users and service providers. However, the expanding user …

Analysis of feature selection and ensemble classifier methods for intrusion detection

HP Vinutha, P Basavaraju - International Journal of Natural …, 2018 - igi-global.com
Day by day network security is becoming more challenging task. Intrusion detection systems
(IDSs) are one of the methods used to monitor the network activities. Data mining algorithms …

[PDF][PDF] A Quality Framework to Improve IDS Performance Through Alert Post-Processing.

AM Riyad, MS Irfan Ahmed… - International Journal of …, 2019 - emeacollege.ac.in
An intrusion detection system is one of the network security tools installed to monitor
suspicious activity in the network and act as a last line of defense. It normally notifies about …

Empirical Analysis of Machine Learning Models towards Adaptive Network Intrusion Detection Systems

SP Senthilkumar, A Arivarasan - 2022 4th International …, 2022 - ieeexplore.ieee.org
The exponential growth of Internet access has resulted in a huge influx of network attacks,
some of which are lethal or have devastating results. As a consequence, the plethora of new …

[图书][B] An investigation of anomaly-based ensemble models for multi-domain intrusion detection

JW Mikhail - 2019 - search.proquest.com
Although the traditional intrusion detection problem has been well studied with the release
of the KDD'99 and NSL-KDD datasets, recent intrusion detection has expanded to include …

Contribution des techniques de datamining dans l'amélioration des systèmes de détection d'intrusion dans les réseaux informatiques

K ABDELKADER - 2017 - dspace.univ-sba.dz
Résumé (Français et/ou Anglais): L'utilisation continue des réseaux informatiques et du web
dans la société d'aujourd'hui a fait que les ressources de la majorité des systèmes …