1
Hierarchical Intrusion Detection Using Machine Learning and Knowledge Model
2
Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices
3
Intrusion detection system using an optimized kernel extreme learning machine and efficient features
4
Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack
5
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security
6
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection
7
Prediction of drive-by download attacks on Twitter
8
Intrusion Detection Using Big Data and Deep Learning Techniques
9
Deep Learning Approach for Intelligent Intrusion Detection System
10
Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN
11
A Survey of Network-based Intrusion Detection Data Sets
12
Adaptive Wavelet Domain Filter for Versatile Video Coding (VVC)
13
Cyber intrusion detection by combined feature selection algorithm
14
KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research
15
Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection
16
Machine Learning in Cyber-Security - Problems, Challenges and Data Sets
17
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset
18
Deep Learning for Encrypted Traffic Classification: An Overview
19
KDD 1999 generation faults: a review and analysis
20
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
21
Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders
22
Identification of malicious activities in industrial internet of things based on deep learning models
23
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
24
Network Intrusion Detection Using Kernel-based Fuzzy-rough Feature Selection
25
An Improved Kernel Clustering Algorithm Used in Computer Network Intrusion Detection
26
Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection
27
A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization
28
Applying Artificial Immune System for Intrusion Detection
29
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
30
Adaptive artificial immune networks for mitigating DoS flooding attacks
31
When Intrusion Detection Meets Blockchain Technology: A Review
32
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
33
A Deep Learning Approach to Network Intrusion Detection
34
Taxonomy for Identification of Security Issues in Cloud Computing Environments
35
Toward a reliable anomaly-based intrusion detection in real-world environments
36
HA-IDS: A heterogeneous anomaly-based intrusion detection system
37
A Dimension Reduction Model and Classifier for Anomaly-Based Intrusion Detection in Internet of Things
38
Classification of intrusion detection system (IDS) based on computer network
39
Incremental k-NN SVM method in intrusion detection
40
Anomaly-Based Intrusion Detection by Modeling Probability Distributions of Flow Characteristics
41
A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
42
Comparative study of conjugate gradient to optimize learning process of neural network for Intrusion Detection System (IDS)
43
Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm
44
Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder
45
An enhanced J48 classification algorithm for the anomaly intrusion detection systems
46
Machine Learning Approach for Detection of nonTor Traffic
47
Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques
48
Unified Host and Network Data Set
49
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis
50
Dataset of anomalies and malicious acts in a cyber-physical subsystem
51
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
52
Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey
53
An Evaluation Framework for Intrusion Detection Dataset
54
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
55
Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis
56
Intrusion detection system using PCA and Fuzzy PCA techniques
57
Detection of SQL injection and XSS attacks in three tier web applications
58
Distributed Network Intrusion Detection Systems: An Artificial Immune System Approach
59
Kharon dataset: Android malware under a microscope
60
Threat analysis of IoT networks using artificial neural network intrusion detection system
61
Principle component analysis based intrusion detection system using support vector machine
62
Towards the creation of synthetic, yet realistic, intrusion detection datasets
63
ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems
64
Artificial immune system based intrusion detection
65
Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS)
66
Classification model of network intrusion using Weighted Extreme Learning Machine
67
Behavior-based features model for malware detection
68
Booters — An analysis of DDoS-as-a-service attacks
69
Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation
70
A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems
71
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
72
Using extreme learning machine for intrusion detection in a big data environment
73
MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach
74
GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing
75
An empirical comparison of botnet detection methods
76
An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set
77
Mining network data for intrusion detection through combining SVMs with ant colony networks
78
A New Clustering Approach for Anomaly Intrusion Detection
79
Network attacks: Taxonomy, tools and systems
80
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
81
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
82
A cost-sensitive decision tree approach for fraud detection
83
Anomaly-based intrusion detection through K-means clustering and naives bayes classification
84
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
85
GMDH-based networks for intelligent intrusion detection
86
How to validate traffic generators?
87
Intrusion detection system (IDS) for combating attacks against cognitive radio networks
88
Hybrid of fuzzy Clustering Neural Network over NSL Dataset for Intrusion Detection System
89
Generation of a new IDS test dataset: Time to retire the KDD collection
90
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines
91
A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
92
An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
93
THE COMBINED APPROACH FOR ANOMALY DETECTION USING NEUR AL NETWORKS AND CLUSTERING TECHNIQUE S
94
Camouflage in Malware: from Encryption to Metamorphism
95
Taxonomy of compliant information security behavior
96
Extreme learning machines for intrusion detection
97
Dissecting Android Malware: Characterization and Evolution
98
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
99
A differentiated one-class classification method with applications to intrusion detection
100
An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection
101
Practical real-time intrusion detection using machine learning approaches
102
Self-adaptive and dynamic clustering for online anomaly detection
103
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
104
Forensic investigation of the OneSwarm anonymous filesharing system
105
Design and analysis of genetic fuzzy systems for intrusion detection in computer networks
106
Adaptive Intrusion Detection based on Boosting and Naïve Bayesian Classifier
107
Incremental SVM based on reserved set for network intrusion detection
108
Machine Learning Approach for IP-Flow Record Anomaly Detection
109
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation
110
Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers
111
A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection
112
A threat taxonomy for mHealth privacy
113
Random effects logistic regression model for anomaly detection
114
A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
115
Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)
116
An adaptive genetic-based signature learning system for intrusion detection
117
A Labeled Data Set for Flow-Based Intrusion Detection
118
Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting
119
A research using hybrid RBF/Elman neural networks for intrusion detection system secure model
120
Detecting Network Anomalies Using CUSUM and EM Clustering
121
Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets
122
Data mining-based intrusion detectors
123
Intrusion detection using fuzzy association rules
124
Association rules applied to credit card fraud detection
125
A survey of techniques for internet traffic classification using machine learning
126
Anomaly pattern detection in categorical datasets
127
FLAME: A Flow-Level Anomaly Modeling Engine
128
AdaBoost-Based Algorithm for Network Intrusion Detection
129
LaasNetExp: a generic polymorphic platform for network emulation and experiments
130
Code Normalization for Self-Mutating Malware
131
Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
132
Design of Multiple-Level Hybrid Classifier for Intrusion Detection System
133
Stochastic models for generating synthetic HTTP source traffic
134
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
135
Wireless security threat taxonomy
136
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
137
Testing Intrusion detection systems
138
The base-rate fallacy and the difficulty of intrusion detection
139
Hacking Exposed; Network Security Secrets and Solutions
140
A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems
141
Towards a taxonomy of intrusion-detection systems
142
The use of the area under the ROC curve in the evaluation of machine learning algorithms
143
The CAIDA UCSD ‘DDoS Attack 2007’ Dataset
144
Official ID2T Repository. ID2T Creates Labeled IT Network Datasets That Contain User Defined Synthetic Attacks
145
Telecooperation Lab—TU Darmstadt
146
A Survey and Taxonomy of Classifiers of Intrusion Detection Systems
147
A Survey of Feature Selection Techniques in Intrusion Detection System: A Soft Computing Perspective
148
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
149
Botnet Research Team, Xi’an Jiaotong University
151
The Top 9 Network Security Threats of 2019
152
Understanding AUC—ROC Curve
153
Malware Vs Viruses: What’s the Difference? Accessed: Feb. 28, 2018
154
Towards a Reliable Intrusion Detection Benchmark Dataset
155
Android Adware and General Malware Dataset
156
Threat Landscape Survey: Users on the Front Line
157
Trends in Validation of DDoS Research
158
‘‘Measuring the impact of DDoS attacks on Webservices-arealtimeexperimentation,’’
159
Towards Generating Real-life Datasets for Network Intrusion Detection
160
Advanced probabilistic approach for network intrusion forecasting and detection
161
Decision tree based light weight intrusion detection using a wrapper approach
162
An efficient intrusion detection system based on support vector machines and gradually feature removal method
163
Design Network Intrusion Detection System using hybrid Fuzzy-Neural Network
164
The Waikoto Internet Trace Storage Project Dataset
165
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
166
How Real Can Synthetic Network Traffic Be
167
MIT Lincoln Laboratory: DARPA Intrusion Detection Evaluation
168
Addressing the Curse of Imbalanced Training Sets: One-Sided Selection
169
SCADA / ICS PCAP Files From 4SICS
173
LBNL/ICSI Enterprise Tracing Project
174
Intrusion Detection Evaluation Dataset (CICIDS2017)