Author:
Rajpoot Vikram,Agrawal Ruchi
Reference18 articles.
1. Hong D, Haibo LA (2009) Lightweight network intrusion detection model based on feature selection. 2009 15th IEEE pacific rim international symposium on dependable computing, Shanghai, pp 165–168
2. Bengio Y, Courville A, Vincent P (2013) Representation learning: a review and new perspectives. IEEE Trans Pattern Anal Mach Intell 35
3. Ishaque Mand Hudec L (2019) Feature extraction using deep learning for intrusion detection system, 2019 2nd international conference on computer applications & information security (ICCAIS), Riyadh, Saudi Arabia, pp 1–5
4. Hu W, Li J, Shi J (2006) Optimal evaluation of feature selection in intrusion detection modeling, 2006 6th world congress on intelligent control and automation, Dalian, pp 5919–5922
5. Kıran MS (2015) TSA: Tree-seed algorithm for continuous optimization. Expert Syst Appl 42(19):6686–6698
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献