Open Access
Issue |
ITM Web Conf.
Volume 70, 2025
2024 2nd International Conference on Data Science, Advanced Algorithm and Intelligent Computing (DAI 2024)
|
|
---|---|---|
Article Number | 04010 | |
Number of page(s) | 5 | |
Section | AI and Advanced Applications | |
DOI | https://doi.org/10.1051/itmconf/20257004010 | |
Published online | 23 January 2025 |
- O. E. Taylor, P. S. Ezekiel, A smart system for detecting behavioural botnet attacks using random forest classifier with principal component analysis. European Journal of Artificial Intelligence and Machine Learning. 1, 11-16 (2017) [Google Scholar]
- I. Obeidat, N. Hamadneh, M. Alkasassbeh, M. Almseidin and M. AlZubi, Intensive Pre-Processing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques. International Association of Online Engineering. 13, 70 (2019) [Google Scholar]
- T. Mehmood and H. B. Md Rais, Machine learning algorithms in context of intrusion detection, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS), (2016), 369-373 [Google Scholar]
- K. Limthong and T. Tawsook, Network traffic anomaly detection using machine learning approaches, 2012 IEEE Network Operations and Management Symposium, (2012), 542-545 [CrossRef] [Google Scholar]
- M. Nawir, A. Amir, O.B. Lynn, N. Yaakob, and R.B. Ahmad, Performances of Machine Learning Algorithms for Binary Classification of Network Anomaly Detection System. J. Phys.: Conf. Ser. 1018 012015 (2017) [Google Scholar]
- B.S. Bhati, C.S. Rai, Analysis of Support Vector Machine-based Intrusion Detection Techniques. Arab J Sci Eng. 45, 2371-2383 (2020) [CrossRef] [Google Scholar]
- N. Elmrabit, F. Zhou, F. Li and H. Zhou, Evaluation of Machine Learning Algorithms for Anomaly Detection, 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), (2020), 1-8 [Google Scholar]
- A. M. Chandrashekhar, K. Raghuveer, Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set. International Journal of Information and Network Security (IJINS). 1, 294-305 (2012) [Google Scholar]
- Y. Y. Aung and M. M. Min, An analysis of random forest algorithm based network intrusion detection system, 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), (2017), 127-132 [Google Scholar]
- Y. Y. Aung and M. M. Min, An analysis of K-means algorithm based network intrusion detection system, Advances in Science. Technology and Engineering Systems Journal. 3, 496-501 (2018) [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.