References
- Vijayanand, R., D. Devaraj, and B. Kannapiran. “Support vector machine-based intrusion detection system with reduced input features for the advanced metering infrastructure of smart grid.” 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2017.
- Khraisat, Ansam, et al. “Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one-class support vector machine.” Electronics 9.1 (2020): 173. doi: https://doi.org/10.3390/electronics9010173
- Teng, Shaohua, et al. “SVM-DT-based adaptive and collaborative intrusion detection.” IEEE/CAA Journal of Automatica Sinica 5.1 (2017): 108-118. doi: https://doi.org/10.1109/JAS.2017.7510730
- Teng, Shao-hua, et al. “Cooperative intrusion detection based on object monitoring.” Acta Sci. Nat. Univ. Suny 47.6 (2008): 76-81.
- Khraisat, Ansam, et al. “A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks.” Electronics 8.11 (2019): 1210. doi: https://doi.org/10.3390/electronics8111210
- Ten, Chee-Wooi, Junho Hong, and Chen-Ching Liu. “Anomaly detection for cybersecurity of the substations.” IEEE Transactions on Smart Grid 2.4 (2011): 865-873. doi: https://doi.org/10.1109/TSG.2011.2159406
- Hong, Junho, Chen-Ching Liu, and Manimaran Govindarasu. “Integrated anomaly detection for cyber security of the substations.” IEEE Transactions on Smart Grid 5.4 (2014): 1643-1653. doi: https://doi.org/10.1109/TSG.2013.2294473
- Pan, Shengyi, Thomas Morris, and Uttam Adhikari. “Developing a hybrid intrusion detection system using data mining for power systems.” IEEE Transactions on Smart Grid 6.6 (2015): 3104-3113. doi: https://doi.org/10.1109/TSG.2015.2409775
- Thaseen, Ikram Sumaiya, and Cherukuri Aswani Kumar. “Intrusion detection model using fusion of chi-square feature selection and multi-class SVM.” Journal of King Saud University-Computer and Information Sciences 29.4 (2017): 462-472. doi: https://doi.org/10.1016/j.jksuci.2015.12.004
- Al-Yaseen, Wathiq Laftah, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri. “Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system.” Expert Systems with Applications 67 (2017): 296-303. doi: https://doi.org/10.1016/j.eswa.2016.09.041
- Bhati, Bhoopesh Singh, and C. S. Rai. “Analysis of support vector machine-based intrusion detection techniques.” Arabian Journal for Science and Engineering 45.4 (2020): 2371-2383. doi: https://doi.org/10.1007/s13369-019-03970-z
- Lee, Sang-Woong, et al. “Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review.” Journal of Network and Computer Applications (2021): 103111.
- Singh, Vijander, et al. “Prediction of COVID-19 corona virus pandemic based on time series data using Support Vector Machine.” Journal of Discrete Mathematical Sciences and Cryptography 23.8 (2020): 1583-1597. doi: https://doi.org/10.1080/09720529.2020.1784535
- Gupta, Amit Kumar, et al. “Prediction of COVID-19 pandemic measuring criteria using support vector machine, prophet and linear regression models in Indian scenario.” Journal of Interdisciplinary Mathematics 24.1 (2021): 89-108. doi: https://doi.org/10.1080/09720502.2020.1833458
- Roffo, Giorgio, et al. “Infinite feature selection: a graph-based feature filtering approach.” IEEE Transactions on Pattern Analysis and Machine Intelligence (2020).
- Bindra, Naveen, and Manu Sood. “Evaluating the Impact of Feature Selection Methods on the Performance of the Machine Learning Models in Detecting DDoS Attacks.” SCIENCE AND TECHNOLOGY 23.3 (2020): 250-261.
- Vaidya, Atharva, and Deepak Kshirsagar. “Analysis of Feature Selection Techniques to Detect DoS Attacks Using Rule-Based Classifiers.” Applied Information Processing Systems. Springer, Singapore, 2022. 311-319.
- Kumar, Ankit, et al. “An improved quantum key distribution protocol for verification.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 491-498. doi: https://doi.org/10.1080/09720529.2019.1637153
- Kumar, Ankit, et al. “An enhanced quantum key distribution protocol for security authentication.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 499-507. doi: https://doi.org/10.1080/09720529.2019.1637154
- Kumar, Ankit, et al. “An enhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm.” Journal of Statistics and Management Systems 22.7 (2019): 1349-1364. doi: https://doi.org/10.1080/09720510.2019.1618519