Two-tier network anomaly detection model: a machine learning approach
Top Cited Papers
- 19 November 2015
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Intelligent Information Systems
- Vol. 48 (1), 61-74
- https://doi.org/10.1007/s10844-015-0388-x
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- A Novel Anomaly Detection System Based on HFR-MLR MethodLecture Notes in Electrical Engineering, 2014
- Introduction and PreviewPublished by Springer Science and Business Media LLC ,2013
- An efficient intrusion detection system based on support vector machines and gradually feature removal methodExpert Systems with Applications, 2011
- A novel intrusion detection system based on hierarchical clustering and support vector machinesExpert Systems with Applications, 2011
- A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiersComputer Communications, 2007
- Using discriminant analysis for multi-class classification: an experimental investigationKnowledge and Information Systems, 2006
- Learning Rules and Clusters for Anomaly Detection in Network TrafficPublished by Springer Science and Business Media LLC ,2005
- Testing Intrusion detection systemsACM Transactions on Information and System Security, 2000
- BIRCHACM SIGMOD Record, 1996
- An Algorithm for Finding Best Matches in Logarithmic Expected TimeACM Transactions on Mathematical Software, 1977