-
1
-
-
84969852879
-
Proceedings of 16th International Conference on Computer as a Tool (EUROCON)
-
IEEE, Salamanca
-
O Osanaiye, M Dlodlo, Proceedings of 16th International Conference on Computer as a Tool (EUROCON), in TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment (IEEE, Salamanca, 2015), pp. 1–6
-
(2015)
TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment
, pp. 1-6
-
-
Osanaiye, O.1
Dlodlo, M.2
-
3
-
-
84888842651
-
Interconnecting federated clouds by using publish-subscribe service
-
C Esposito, M Ficco, F Palmieri, A Castiglione, Interconnecting federated clouds by using publish-subscribe service. Cluster comput 16(4), 887–903 (2013)
-
(2013)
Cluster comput
, vol.16
, Issue.4
, pp. 887-903
-
-
Esposito, C.1
Ficco, M.2
Palmieri, F.3
Castiglione, A.4
-
4
-
-
84900453631
-
Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
-
S Shamshirband, NB Anuar, ML Kiah, VA Rohani, D Petković, S Misra, AN Khan, Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J Netw Comput Appl 42, 102–117 (2014)
-
(2014)
J Netw Comput Appl
, vol.42
, pp. 102-117
-
-
Shamshirband, S.1
Anuar, N.B.2
Kiah, M.L.3
Rohani, V.A.4
Petković, D.5
Misra, S.6
Khan, A.N.7
-
5
-
-
84900419562
-
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
-
S Shamshirband, A Patel, NB Anuar, MLM Kiah, A Abraham, Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng Appl Artif Intell 32, 228–241 (2014)
-
(2014)
Eng Appl Artif Intell
, vol.32
, pp. 228-241
-
-
Shamshirband, S.1
Patel, A.2
Anuar, N.B.3
Kiah, M.L.M.4
Abraham, A.5
-
6
-
-
84956680241
-
Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework
-
O Osanaiye, K-KR Choo, M Dlodlo, Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl 67, 147–65 (2016)
-
(2016)
J. Netw. Comput. Appl
, vol.67
, pp. 147-165
-
-
Osanaiye, O.1
Choo, K.-K.R.2
Dlodlo, M.3
-
7
-
-
84924706348
-
Stealthy denial of service strategy in cloud computing
-
M Ficco, M Rak, Stealthy denial of service strategy in cloud computing. IEEE Trans Cloud Comput 3(1), 80–94 (2015)
-
(2015)
IEEE Trans Cloud Comput
, vol.3
, Issue.1
, pp. 80-94
-
-
Ficco, M.1
Rak, M.2
-
8
-
-
84901987724
-
Incremental proxy re-encryption scheme for mobile cloud computing environment
-
AN Khan, MM Kiah, SA Madani, M Ali, S Shamshirband, Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2), 624–651 (2014)
-
(2014)
J Supercomput
, vol.68
, Issue.2
, pp. 624-651
-
-
Khan, A.N.1
Kiah, M.M.2
Madani, S.A.3
Ali, M.4
Shamshirband, S.5
-
9
-
-
84950320625
-
-
Springer, Kyoto
-
L Krämer, J Krupp, D Makita, T Nishizoe, T Koide, K Yoshioka, C Rossow, Proceedings of 18th International Symposium on Research in Attacks Intrusion and Defenses (RAID). AmpPot: monitoring and defending against amplification DDoS attacks (Springer, Kyoto, 2015), pp. 615–636
-
(2015)
Proceedings of 18th International Symposium on Research in Attacks Intrusion and Defenses (RAID). AmpPot: monitoring and defending against amplification DDoS attacks
, pp. 615-636
-
-
Krämer, L.1
Krupp, J.2
Makita, D.3
Nishizoe, T.4
Koide, T.5
Yoshioka, K.6
Rossow, C.7
-
10
-
-
84969891769
-
Geographical information system parallelization for spatial big data processing: a review
-
(Springer, in press)
-
L Zhao, L Chen, R Ranjan, K-K R Choo and J He, Geographical information system parallelization for spatial big data processing: a review. Cluster Comput. (Springer, 2015 in press)
-
(2015)
Cluster Comput.
-
-
Zhao, L.1
Chen, L.2
Ranjan, R.3
Choo, K.-K.R.4
He, J.5
-
11
-
-
84916888408
-
Impacts of increasing volume of digital forensic data: a survey and future research challenges
-
D Quick, K-KR Choo, Impacts of increasing volume of digital forensic data: a survey and future research challenges. Digit Investig 11(4), 273–294 (2014)
-
(2014)
Digit Investig
, vol.11
, Issue.4
, pp. 273-294
-
-
Quick, D.1
Choo, K.-K.R.2
-
12
-
-
85086766707
-
-
Wei, C Hu: Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans Cloud Comput
-
Z Xu, Y Liu, N Yen, L Mei, X Luo, X Wei, C Hu, Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans Cloud Comput (2016) DOI: 10.1109/TCC.2016.2517638.
-
(2016)
Mei, X Luo
, vol.10
-
-
Z Xu, Y.1
Liu, N.2
Yen, L.3
-
13
-
-
84958045978
-
Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media
-
Z Xu, H Zhang, V Sugumaran, K-KR Choo, L Mei, Y Zhu, Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media. EURASIP J Wirel Commun Netw 1, 1–9 (2016)
-
(2016)
EURASIP J Wirel Commun Netw
, vol.1
, pp. 1-9
-
-
Xu, Z.1
Zhang, H.2
Sugumaran, V.3
Choo, K.-K.R.4
Mei, L.5
Zhu, Y.6
-
14
-
-
84964331105
-
Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles
-
Elsevier, in press)
-
J Peng, K-K R Choo, H Ashman, Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles. J Netw Comput Appl. (Elsevier, 2016 in press)
-
(2016)
J Netw Comput Appl.
-
-
Peng, J.1
Choo, K.-K.R.2
Ashman, H.3
-
15
-
-
80052421871
-
Fast wrapper feature subset selection in high-dimensional datasets by means of filter re-ranking
-
P Bermejo, L de la Ossa, J Gámez, J Puerta, Fast wrapper feature subset selection in high-dimensional datasets by means of filter re-ranking. Knowl-Based Syst 25(1), 35–44 (2012)
-
(2012)
Knowl-Based Syst
, vol.25
, Issue.1
, pp. 35-44
-
-
Bermejo, P.1
de la Ossa, L.2
Gámez, J.3
Puerta, J.4
-
16
-
-
33845998197
-
Proceedings of the 2nd SKLOIS Conference Information Security and Cryptology (INSCRYPT)
-
Springer, Beijing
-
Y Chen, Y Li, X Cheng, L Guo, Proceedings of the 2nd SKLOIS Conference Information Security and Cryptology (INSCRYPT), in Survey and taxonomy of feature selection algorithms in intrusion detection system (Springer, Beijing, 2006), pp. 153–167
-
(2006)
Survey and taxonomy of feature selection algorithms in intrusion detection system
, pp. 153-167
-
-
Chen, Y.1
Li, Y.2
Cheng, X.3
Guo, L.4
-
17
-
-
84944078166
-
Constructing important features from massive network traffic for lightweight intrusion detection
-
W Wang, Y He, J Liu, S Gombault, Constructing important features from massive network traffic for lightweight intrusion detection. IET Inform Secur 9(6), 374–379 (2015)
-
(2015)
IET Inform Secur
, vol.9
, Issue.6
, pp. 374-379
-
-
Wang, W.1
He, Y.2
Liu, J.3
Gombault, S.4
-
18
-
-
79151484606
-
Feature selection and classification in multiple class datasets: an application to KDD Cup 99 dataset
-
V Bolon-Canedo, N Sanchez-Marono, A Alonso-Betanzos, Feature selection and classification in multiple class datasets: an application to KDD Cup 99 dataset. Expert Syst Appl 38(5), 5947–5957 (2011)
-
(2011)
Expert Syst Appl
, vol.38
, Issue.5
, pp. 5947-5957
-
-
Bolon-Canedo, V.1
Sanchez-Marono, N.2
Alonso-Betanzos, A.3
-
19
-
-
11244260106
-
-
accessed 7 February
-
Data mining software in Java. http://www.cs.waikato.ac.nz/ml/weka/(Last accessed 7 February 2016)
-
(2016)
Data mining software in Java
-
-
-
20
-
-
84865209539
-
A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
-
L Koc, T Mazzuchi, S Sarkani, A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Syst Appl 39(18), 13492–13500 (2012)
-
(2012)
Expert Syst Appl
, vol.39
, Issue.18
, pp. 13492-13500
-
-
Koc, L.1
Mazzuchi, T.2
Sarkani, S.3
-
21
-
-
84969852506
-
Proceedings of the 3rd International conference on Risks and Security of Internet and Systems (CRiSIS’08)
-
IEEE, Tozeur
-
W Wang, S Gombault, W Wang, S Gombault, Proceedings of the 3rd International conference on Risks and Security of Internet and Systems (CRiSIS’08), in Efficient detection of DDoS attacks with important attributes (IEEE, Tozeur, 2008), pp. 61–67
-
(2008)
Efficient detection of DDoS attacks with important attributes
, pp. 61-67
-
-
Wang, W.1
Gombault, S.2
Wang, W.3
Gombault, S.4
-
22
-
-
84878107136
-
GMDH-based networks for intelligent intrusion detection
-
Z Baig, S Sait, A Shaheen, GMDH-based networks for intelligent intrusion detection. Eng Appl Artif Intel 26(7), 1731–1740 (2013)
-
(2013)
Eng Appl Artif Intel
, vol.26
, Issue.7
, pp. 1731-1740
-
-
Baig, Z.1
Sait, S.2
Shaheen, A.3
-
23
-
-
84864772502
-
An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
-
S Lin, K Ying, C Lee, Z Lee, An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Appl Soft Comput 12(10), 3285–3290 (2012)
-
(2012)
Appl Soft Comput
, vol.12
, Issue.10
, pp. 3285-3290
-
-
Lin, S.1
Ying, K.2
Lee, C.3
Lee, Z.4
-
24
-
-
81855197007
-
An efficient intrusion detection system based on support vector machines and gradually feature removal method
-
Y Li, J Xia, S Zhang, J Yan, X Ai, K Dai, An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst Appl 39(1), 424–430 (2012)
-
(2012)
Expert Syst Appl
, vol.39
, Issue.1
, pp. 424-430
-
-
Li, Y.1
Xia, J.2
Zhang, S.3
Yan, J.4
Ai, X.5
Dai, K.6
-
25
-
-
81855221688
-
Decision tree based light weight intrusion detection using a wrapper approach
-
S Sindhu, S Geetha, A Kannan, Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst Appl 39(1), 129–141 (2012)
-
(2012)
Expert Syst Appl
, vol.39
, Issue.1
, pp. 129-141
-
-
Sindhu, S.1
Geetha, S.2
Kannan, A.3
-
26
-
-
84893334410
-
Proceedings of the 8th International Conference on Networking, Architecture and Storage (NAS)
-
IEEE, Xi’an
-
F Zhang, D Wang, Proceedings of the 8th International Conference on Networking, Architecture and Storage (NAS), in An effective feature selection approach for network intrusion detection (IEEE, Xi’an, 2013), pp. 307–311
-
(2013)
An effective feature selection approach for network intrusion detection
, pp. 307-311
-
-
Zhang, F.1
Wang, D.2
-
27
-
-
84969891743
-
Multi-measure multi-weight ranking approach for the identification of the network features for the detection of DoS and Probe attacks
-
S Bhattacharya, S Selvakumar, Multi-measure multi-weight ranking approach for the identification of the network features for the detection of DoS and Probe attacks. Compt. J. 1-21 (2015)
-
(2015)
Compt. J
, pp. 1-21
-
-
Bhattacharya, S.1
Selvakumar, S.2
-
28
-
-
84969852496
-
Analysis of KDD’99 intrusion detection dataset for selection of relevance features (San Francisco
-
A Olusola, A Oladele, D Abosede, in Proceedings of the World Congress on Engineering and Computer Science. Analysis of KDD’99 intrusion detection dataset for selection of relevance features (San Francisco, USA, 2010), pp.1-7. http://www.iaeng.org/publication/WCECS2010/WCECS2010_pp162-168.pdf
-
(2010)
USA
, pp. 1-7
-
-
-
29
-
-
84876731442
-
Designing of on line intrusion detection system using rough set theory and Q-learning algorithm
-
N Sengupta, J Sen, J Sil, M Saha, Designing of on line intrusion detection system using rough set theory and Q-learning algorithm. Neurocomputing 111, 161–168 (2013)
-
(2013)
Neurocomputing
, vol.111
, pp. 161-168
-
-
Sengupta, N.1
Sen, J.2
Sil, J.3
Saha, M.4
-
30
-
-
84870039675
-
The Proceedings of International Conference on Industrial Control and Electronics Engineering (ICICEE)
-
IEEE, Xi’an
-
G Geng, N Li, S Gong, The Proceedings of International Conference on Industrial Control and Electronics Engineering (ICICEE), in Feature Selection Method for Network Intrusion Based on Fast Attribute Reduction of Rough Set (IEEE, Xi’an, 2012), pp. 530–534
-
(2012)
Feature Selection Method for Network Intrusion Based on Fast Attribute Reduction of Rough Set
, pp. 530-534
-
-
Geng, G.1
Li, N.2
Gong, S.3
-
31
-
-
84875487746
-
-
Springer, Samos, Greece
-
B Agarwal, N Mittal, Proceedings of 14th International Conference on Computational Linguistics and Intelligent Text Processing (CICLing). Optimal feature selection for sentiment analysis (Springer, Samos, Greece, 2013), pp. 13–24
-
(2013)
Proceedings of 14th International Conference on Computational Linguistics and Intelligent Text Processing (CICLing). Optimal feature selection for sentiment analysis
, pp. 13-24
-
-
Agarwal, B.1
Mittal, N.2
-
32
-
-
84969891752
-
Proceedings of the International Conference on Cloud & Ubiquitous Computing & Emerging Technologies (CUBE)
-
IEEE, Pune
-
A Tesfahun, D Bhaskari, Proceedings of the International Conference on Cloud & Ubiquitous Computing & Emerging Technologies (CUBE), in Intrusion Detection using Random Forests Classifier with SMOTE and Feature Reduction (IEEE, Pune, 2013), pp. 127–132
-
(2013)
Intrusion Detection using Random Forests Classifier with SMOTE and Feature Reduction
, pp. 127-132
-
-
Tesfahun, A.1
Bhaskari, D.2
-
34
-
-
84990211540
-
Adaptive layered approach using machine learning techniques with gain ratio for intrusion detection systems
-
H Ibrahim, S Badr, M Shaheen, Adaptive layered approach using machine learning techniques with gain ratio for intrusion detection systems. Int J Comput Appl 56(7), 10–16 (2012)
-
(2012)
Int J Comput Appl
, vol.56
, Issue.7
, pp. 10-16
-
-
Ibrahim, H.1
Badr, S.2
Shaheen, M.3
-
35
-
-
85032442044
-
-
Springer, Hyderabad
-
L Devi, P Subathra, P Kumar, Proceedings of the Fifth International Conference on Fuzzy and Neuro Computing (FANCCO-2015). Tweet sentiment classification using an ensemble of machine learning supervised classifiers employing statistical feature selection methods (Springer, Hyderabad, 2015), pp. 1–13
-
(2015)
Proceedings of the Fifth International Conference on Fuzzy and Neuro Computing (FANCCO-2015). Tweet sentiment classification using an ensemble of machine learning supervised classifiers employing statistical feature selection methods
, pp. 1-13
-
-
Devi, L.1
Subathra, P.2
Kumar, P.3
-
36
-
-
84867852050
-
Detecting unknown computer worm activity via support vector machines and active learning
-
N Nissim, R Moskovitch, L Rokach, Y Elovici, Detecting unknown computer worm activity via support vector machines and active learning. Pattern Anal Appl 15(4), 459–475 (2012)
-
(2012)
Pattern Anal Appl
, vol.15
, Issue.4
, pp. 459-475
-
-
Nissim, N.1
Moskovitch, R.2
Rokach, L.3
Elovici, Y.4
-
37
-
-
84936863859
-
A hybrid algorithm for feature subset selection in high-dimensional datasets using FICA and IWSSr algorithm
-
M Moradkhani, A Amiri, M Javaherian, H Safari, A hybrid algorithm for feature subset selection in high-dimensional datasets using FICA and IWSSr algorithm. Appl Soft Comput 35, 123–135 (2015)
-
(2015)
Appl Soft Comput
, vol.35
, pp. 123-135
-
-
Moradkhani, M.1
Amiri, A.2
Javaherian, M.3
Safari, H.4
-
38
-
-
38449087399
-
-
Springer, Birmingham
-
N Sánchez-Maroño, A Alonso-Betanzos, M Tombilla-Sanromán, Proceedings of the Eighth International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2007). Filter methods for feature selection—a comparative study (Springer, Birmingham, 2007), pp. 178–187
-
(2007)
Proceedings of the Eighth International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2007). Filter methods for feature selection—a comparative study
, pp. 178-187
-
-
Sánchez-Maroño, N.1
Alonso-Betanzos, A.2
Tombilla-Sanromán, M.3
-
39
-
-
0346457323
-
Proceedings of the International Conference on Management of Data
-
ACM SIGMOD, Philadelphia
-
J Gehrke, V Ganti, R Ramakrishnan, W Loh, Proceedings of the International Conference on Management of Data, in BOAT—optimistic decision tree construction (ACM SIGMOD, Philadelphia, 1999), pp. 169–180
-
(1999)
BOAT—optimistic decision tree construction
, pp. 169-180
-
-
Gehrke, J.1
Ganti, V.2
Ramakrishnan, R.3
Loh, W.4
-
40
-
-
40849099949
-
Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees
-
C Xiang, P Yong, L Meng, Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees. Pattern Recognit Lett 29(7), 918–924 (2008)
-
(2008)
Pattern Recognit Lett
, vol.29
, Issue.7
, pp. 918-924
-
-
Xiang, C.1
Yong, P.2
Meng, L.3
-
41
-
-
84859906955
-
Proceedings of the International Conference on Computing, Networking and Communications (ICNC)
-
IEEE, Maui
-
T Bujlow, T Riaz, J Pedersen, Proceedings of the International Conference on Computing, Networking and Communications (ICNC), in A method for classification of network traffic based on C5. 0 Machine Learning Algorithm (IEEE, Maui, 2012), pp. 237–241
-
(2012)
A method for classification of network traffic based on C5. 0 Machine Learning Algorithm
, pp. 237-241
-
-
Bujlow, T.1
Riaz, T.2
Pedersen, J.3
-
42
-
-
84904659464
-
-
Springer, Cairo
-
H Eid, A Hassanien, T Kim, S Banerjee, Proceedings of the 1st International Conference on Advances in Security of Information and Communication Networks (SecNet). Linear correlation-based feature selection for network intrusion detection model (Springer, Cairo, 2013), pp. 240–248
-
(2013)
Proceedings of the 1st International Conference on Advances in Security of Information and Communication Networks (SecNet). Linear correlation-based feature selection for network intrusion detection model
, pp. 240-248
-
-
Eid, H.1
Hassanien, A.2
Kim, T.3
Banerjee, S.4
-
43
-
-
84869006945
-
Proceedings of the 2nd Symposium on Computational Intelligence for Security and Defence Applications(CISDA)
-
IEEE, Ottawa
-
M Tavallaee, E Bagheri, W Lu, A Ghorbani, Proceedings of the 2nd Symposium on Computational Intelligence for Security and Defence Applications(CISDA), in A detailed analysis of the KDD CUP 99 data set (IEEE, Ottawa, 2009), pp. 1–6
-
(2009)
A detailed analysis of the KDD CUP 99 data set
, pp. 1-6
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.4
-
44
-
-
84888375268
-
An in-depth analysis on traffic flooding attacks detection and system using data mining techniques
-
J Yu, H Kang, D Park, H Bang, D Kang, An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. J Syst Architect 59(10), 1005–1012 (2013)
-
(2013)
J Syst Architect
, vol.59
, Issue.10
, pp. 1005-1012
-
-
Yu, J.1
Kang, H.2
Park, D.3
Bang, H.4
Kang, D.5
-
45
-
-
84929620760
-
Evolving statistical rulesets for network intrusion detection
-
S Rastegari, P Hingston, C Lam, Evolving statistical rulesets for network intrusion detection. Appl Soft Comput 33, 348–359 (2015)
-
(2015)
Appl Soft Comput
, vol.33
, pp. 348-359
-
-
Rastegari, S.1
Hingston, P.2
Lam, C.3
|