Author:
Eid Heba F,Azar Ahmad Taher,Hassanien Aboul Ella
Reference30 articles.
1. X. Xu, “Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction", International Journal of Web Services Practices, vol. 2, pp. 49-58 2006.
2. J. Quinlan, “C4.5: Programs for Machine Learning", Morgan Kaufmann, San Mateo, 1993.
3. L. Breiman, “Random Forests", Machine Learning, vol. 45, pp. 5–32, 2001.
4. F. Jemili, M. Zaghdoud and M. Ahmed, “Intrusion detection based on Hybrid propagation in Bayesian Networks," In proceedings of the IEEE international conference on Intelligence and security informatics, pp. 137–142, 2009.
5. J. Rissanen, “Modeling by shortest data description", Automatica, vol. 14, pp. 465-471, 1978.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Novel Hybrid Genetic Arithmetic Optimization for Feature Selection and Classification of Pulmonary Disease Images;International Journal of Sociotechnology and Knowledge Development;2023-09-12
2. Novel Adaptive Histogram Binning-Based Lesion Segmentation for Discerning Severity in COVID-19 Chest CT Scan Images;International Journal of Sociotechnology and Knowledge Development;2023-06-09
3. Novel Architecture for Image Classification Based on Rough Set;International Journal of Service Science, Management, Engineering, and Technology;2023-05-19
4. Deep Learning & Computer Vision Integrated Smart Voting System;2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE);2023-04-29
5. A Novel Deep Learning Model for Recognition of Endangered Water-Bird Species;International Journal of Sociotechnology and Knowledge Development;2022-12-21