References
- Fong, Elizabeth, and Vadim Okun. “Web application scanners: definitions and functions.” 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07). IEEE, 2007.
- Folorunso, Olusegun, Femi Emmanuel Ayo, and Y. E. Babalola. “Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach.” Journal of Information Privacy and Security 12.4 (2016): 181-196. doi: 10.1080/15536548.2016.1257680
- Salih, Azar Abid, and Maiwan Bahjat Abdulrazaq. “Combining Best Features Selection Using Three Classifiers in Intrusion Detection System.” 2019 International Conference on Advanced Science and Engineering (ICOASE). IEEE, 2019.
- Divyasree, T. H., and K. K. Sherly. “A Network Intrusion Detection System Based On Ensemble CVM Using Efficient Feature Selection Approach.” Procedia computer science 143 (2018): 442-449. doi: 10.1016/j.procs.2018.10.416
- Salo, Fadi, Ali Bou Nassif, and Aleksander Essex. “Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection.” Computer Networks 148 (2019): 164-175. doi: 10.1016/j.comnet.2018.11.010
- Manzoor, Ishfaq, and Neeraj Kumar. “A feature reduced intrusion detection system using ANN classifier.” Expert Systems with Applications 88 (2017): 249-257. doi: 10.1016/j.eswa.2017.07.005
- Yulianto, Arif, Parman Sukarno, and Novian Anggis Suwastika. “Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset.” Journal of Physics: Conference Series. Vol. 1192. No. 1. IOP Publishing, 2019.
- Sornsuwit, Ployphan, and Saichon Jaiyen. “A New Hybrid Machine Learning for Cybersecurity Threat Detection Based on Adaptive Boosting.” Applied Artificial Intelligence 33.5 (2019): 462-482. doi: 10.1080/08839514.2019.1582861
- Zheng, Jun, and Yujie Zhou. “Intrusion detection algorithm based on improved principal component analysis.” Journal of Discrete Mathematical Sciences and Cryptography 20.5 (2017): 1007-1016. doi: 10.1080/09720529.2017.1310979
- Velliangiri, S. “A hybrid BGWO with KPCA for intrusion detection.” Journal of Experimental & Theoretical Artificial Intelligence (2019): 1-16.
- Kumar, Ankit, et al. “An enhanced quantum key distribution protocol for security authentication.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 499-507. doi: 10.1080/09720529.2019.1637154
- Sharafaldin, Iman, Arash Habibi Lashkari, and Ali A. Ghorbani. “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.” ICISSP. 2018.
- Singh Panwar, Shailesh, Y. P. Raiwani, and Lokesh Singh Panwar. “Evaluation of Network Intrusion Detection with Features Selection and Machine Learning Algorithms on CICIDS-2017 Dataset.” Available at SSRN 3394103 (2019).
- Khan, Farrukh Aslam, et al. “A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection.” IEEE Access 7 (2019): 30373-30385. doi: 10.1109/ACCESS.2019.2899721