Search Results

There are 103124 results for: content related to: Application of artificial bee colony for intrusion detection systems

  1. Network intrusion detection using hybrid binary PSO and random forests algorithm

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2646–2660, Arif Jamal Malik, Waseem Shahzad and Farrukh Aslam Khan

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.508

  2. Improving intrusion detection for imbalanced network traffic

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 309–324, Ciza Thomas

    Version of Record online : 10 JUL 2012, DOI: 10.1002/sec.564

  3. You have free access to this content
    Network Intrusion Detection Based on Directed Acyclic Graph and Belief Rule Base

    ETRI Journal

    Volume 39, Issue 4, August 2017, Pages: 592–604, Bang-Cheng Zhang, Guan-Yu Hu, Zhi-Jie Zhou, You-Min Zhang, Pei-Li Qiao and Lei-Lei Chang

    Version of Record online : 11 AUG 2017, DOI: 10.4218/etrij.17.0116.0305

  4. Towards reducing false alarms in network intrusion detection systems with data summarization technique

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 275–285, Neminath Hubballi, Santosh Biswas and Sukumar Nandi

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.562

  5. Hybrid flexible neural-tree-based intrusion detection systems

    International Journal of Intelligent Systems

    Volume 22, Issue 4, April 2007, Pages: 337–352, Yuehui Chen, Ajith Abraham and Bo Yang

    Version of Record online : 16 FEB 2007, DOI: 10.1002/int.20203

  6. Using particle swarm optimization in fuzzy association rules-based feature selection and fuzzy ARTMAP-based attack recognition

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 797–811, Mansour Sheikhan and Maryam Sharifi Rad

    Version of Record online : 13 AUG 2012, DOI: 10.1002/sec.609

  7. Hybrid intelligent systems for detecting network intrusions

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2741–2749, Mrutyunjaya Panda, Ajith Abraham and Manas Ranjan Patra

    Version of Record online : 11 JUL 2012, DOI: 10.1002/sec.592

  8. You have free access to this content
    Hybrid Fuzzy Adaptive Wiener Filtering with Optimization for Intrusion Detection

    ETRI Journal

    Volume 37, Issue 3, June 2015, Pages: 502–511, Revathi Sujendran and Malathi Arunachalam

    Version of Record online : 1 JUN 2015, DOI: 10.4218/etrij.15.0114.0275

  9. You have free access to this content
    ASF/SF2 and SC35 regulate the glutamate receptor subunit 2 alternative flip/flop splicing

    FEBS Letters

    Volume 579, Issue 19, August 01, 2005, Pages: 4138–4144, Trine Elkjær Crovato and Jan Egebjerg

    Version of Record online : 6 JUL 2005, DOI: 10.1016/j.febslet.2005.06.044

  10. You have free access to this content
    STRATEGIES IN RESPONDING TO THE NEW TOEFL READING TASKS

    ETS Research Report Series

    Volume 2006, Issue 1, June 2006, Pages: i–162, Andrew D. Cohen and Thomas A. Upton

    Version of Record online : 8 AUG 2014, DOI: 10.1002/j.2333-8504.2006.tb02012.x

  11. Detection and classification of anomaly intrusion using hierarchy clustering and SVM

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3401–3411, Chenghua Tang, Yang Xiang, Yu Wang, Junyan Qian and Baohua Qiang

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1547

  12. An optimization process to identify outliers generated by intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3469–3480, Fatma Hachmi, Khadouja Boujenfa and Mohamed Limam

    Version of Record online : 1 MAY 2015, DOI: 10.1002/sec.1271

  13. Data mining techniques for information security applications

    Wiley Interdisciplinary Reviews: Computational Statistics

    Volume 3, Issue 3, May/June 2011, Pages: 221–229, Amany Al-Shawi

    Version of Record online : 14 MAR 2011, DOI: 10.1002/wics.161

  14. Artificial boundary method for the exterior Stokes flow in three dimensions

    International Journal for Numerical Methods in Fluids

    Volume 41, Issue 5, 20 February 2003, Pages: 537–549, Chunxiong Zheng and Houde Han

    Version of Record online : 22 JAN 2003, DOI: 10.1002/fld.451

  15. An incremental intrusion detection system using a new semi-supervised stream classification method

    International Journal of Communication Systems

    Volume 30, Issue 4, 10 March 2017, Fakhroddin Noorbehbahani, Ali Fanian, Rasoul Mousavi and Homa Hasannejad

    Version of Record online : 19 JUN 2015, DOI: 10.1002/dac.3002

  16. Voltage and Reactive Power Control

    Electric Power Systems: Analysis and Control

    Fabio Saccomanno, Pages: 486–561, 2005

    Published Online : 28 JAN 2005, DOI: 10.1002/0471722901.ch6

  17. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1193–1212, Abdelouahid Derhab and Abdelghani Bouras

    Version of Record online : 8 JUL 2014, DOI: 10.1002/sec.1074

  18. Network specific vulnerability based alert reduction approach

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 15–27, Humphrey Waita Njogu, Luo Jiawei and Jane Nduta Kiere

    Version of Record online : 29 MAR 2012, DOI: 10.1002/sec.520

  19. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  20. On handling negative transfer and imbalanced distributions in multiple source transfer learning

    Statistical Analysis and Data Mining: The ASA Data Science Journal

    Volume 7, Issue 4, August 2014, Pages: 254–271, Liang Ge, Jing Gao, Hung Ngo, Kang Li and Aidong Zhang

    Version of Record online : 18 APR 2014, DOI: 10.1002/sam.11217