A data-driven machine learning approach for discovering potent LasR inhibitors

CMM Koh, LSY Ping, CHH Xuan, LB Theng… - …, 2023 - Taylor & Francis
The rampant spread of multidrug-resistant Pseudomonas aeruginosa strains severely
threatens global health. This severity is compounded against the backdrop of a stagnating …

Intrusion detection using classification techniques: a comparative study

I Bouteraa, M Derdour, A Ahmim - International Journal of …, 2020 - inderscienceonline.com
Today's highly connected world suffers from the increase and variety of cyber-attacks. To
mitigate those threats, researchers have been continuously exploring different methods for …

A novel cyber intrusion detection model based on improved hybrid sampling

H Qian, X Zhang, C Zhang… - Transactions of the …, 2023 - journals.sagepub.com
The class imbalance of samples of network traffic will cause the poor classification
performance of intrusion detection models based on machine learning. To solve this …

Improving the security in healthcare information system through Elman neural network based classifier

B Al-Dhafian, I Ahmad, M Hussain… - Journal of Medical …, 2017 - ingentaconnect.com
Intrusions are critical issues in information system of healthcare sector because a sole
intrusion can cause health issue due to any manipulation in the medical record of the …

An overview of the current classification techniques in intrusion detection

B Al-Dhafian, I Ahmad… - Proceedings of the …, 2015 - search.proquest.com
During the last decade, a lot of attention has been given to intrusion detection systems
(IDSs) as another security tools used to detect attacks and make working in computer …

Sistemas de detección de intrusos con mapas autoorganizativos probabilísticos y optimización multiobjetivo

E Hoz Franco - 2016 - digibug.ugr.es
Disponer de procedimientos eficientes de clasificación de patrones es esencial en muchas
aplicaciones de gran interés socio-económico. Una de ellas es el diseño de Sistemas de …

[PDF][PDF] A Survey on Attacks and Advances of Intrusion Detection Systems

R kishor Ahirwar, S Sharma - core.ac.uk
Now day's information of an organization floating over the internet that increases the traffic
on the network as well as threats from attackers. To protect these sensitive material Intrusion …

[PDF][PDF] An Extensive Survey of Intrusion Detection Systems

AP Sahu, KS AmitSaxena - 2017 - academia.edu
There are multiple ways detection is performed by IDS. In signature-based detection, a
pattern or signature is in comparison to previous events to disclose present threats. But the …

[PDF][PDF] A Comprehensive Survey of Intrusion Detection Systems

VN Tiwari, K Patidar, S Rathore, MK Yadav - academia.edu
Alongside with digital signatures and Cryptographic protocols, Intrusion Detection Systems
(IDS) are judged to be the final contour of protection to protect a system. But the major …

[引用][C] 基于多目标数学规划的网络入侵检测方法

汪波, 聂晓伟 - 计算机研究与发展, 2015