Search Results

There are 10016 results for: content related to: Network intrusion detection using hybrid binary PSO and random forests algorithm

  1. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1193–1212, Abdelouahid Derhab and Abdelghani Bouras

    Version of Record online : 8 JUL 2014, DOI: 10.1002/sec.1074

  2. Hybrid intelligent systems for detecting network intrusions

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2741–2749, Mrutyunjaya Panda, Ajith Abraham and Manas Ranjan Patra

    Version of Record online : 11 JUL 2012, DOI: 10.1002/sec.592

  3. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Version of Record online : 20 FEB 2014, DOI: 10.1002/sec.955

  4. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  5. An incremental intrusion detection system using a new semi-supervised stream classification method

    International Journal of Communication Systems

    Fakhroddin Noorbehbahani, Ali Fanian, Rasoul Mousavi and Homa Hasannejad

    Version of Record online : 19 JUN 2015, DOI: 10.1002/dac.3002

  6. Combining expert knowledge with automatic feature extraction for reliable web attack detection

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2750–2767, Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Alvarez and Katrin Franke

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.603

  7. An efficient intrusion detection framework in cluster-based wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1211–1224, Hichem Sedjelmaci, Sidi Mohammed Senouci and Mohammed Feham

    Version of Record online : 30 JAN 2013, DOI: 10.1002/sec.687

  8. Application of artificial bee colony for intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2730–2740, Monther Aldwairi, Yaser Khamayseh and Mohammad Al-Masri

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.588

  9. Intrusion detection algorithm based on OCSVM in industrial control system

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1040–1049, Wenli Shang, Peng Zeng, Ming Wan, Lin Li and Panfeng An

    Version of Record online : 10 DEC 2015, DOI: 10.1002/sec.1398

  10. Improving intrusion detection for imbalanced network traffic

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 309–324, Ciza Thomas

    Version of Record online : 10 JUL 2012, DOI: 10.1002/sec.564

  11. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

    Security and Communication Networks

    Keke Gai, Meikang Qiu, Lixin Tao and Yongxin Zhu

    Version of Record online : 11 FEB 2015, DOI: 10.1002/sec.1224

  12. A new intrusion detection method based on SVM with minimum within-class scatter

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1064–1074, Wenjuan An and Mangui Liang

    Version of Record online : 18 DEC 2012, DOI: 10.1002/sec.666

  13. Intrusion detection alert management for high-speed networks: current researches and applications

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4362–4372, Hassen Sallay and Sami Bourouis

    Version of Record online : 15 SEP 2015, DOI: 10.1002/sec.1366

  14. Intrusion Detection Techniques

    Standard Article

    The Internet Encyclopedia

    Peng Ning and Sushil Jajodia

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie097

  15. Data mining techniques for information security applications

    Wiley Interdisciplinary Reviews: Computational Statistics

    Volume 3, Issue 3, May/June 2011, Pages: 221–229, Amany Al-Shawi

    Version of Record online : 14 MAR 2011, DOI: 10.1002/wics.161

  16. Rashnu: a Wi-Fi intrusion response scheme

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2070–2078, S. Mobarakeh Moosavirad, Peyman Kabiri and Hamidreza Mahini

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1153

  17. Detecting intrusion transactions in databases using data item dependencies and anomaly analysis

    Expert Systems

    Volume 25, Issue 5, November 2008, Pages: 460–473, Sattar Hashemi, Ying Yang, Davoud Zabihzadeh and Mohammadreza Kangavari

    Version of Record online : 21 OCT 2008, DOI: 10.1111/j.1468-0394.2008.00467.x

  18. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  19. Architecture and performance evaluation of a hybrid intrusion detection system for IP telephony

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1539–1555, Bazara I. A. Barry and H. A. Chan

    Version of Record online : 5 MAY 2010, DOI: 10.1002/sec.174

  20. A novel sine-curve mobility model for intrusion detection in wireless sensor networks

    Wireless Communications and Mobile Computing

    Volume 13, Issue 17, 10 December 2013, Pages: 1555–1570, Yun Wang, Yoon Kah Leow and Jun Yin

    Version of Record online : 10 NOV 2011, DOI: 10.1002/wcm.1202