THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Tiêu đề | Privacy and Security Issues in Big Data |
---|---|
Tác giả | Pradip Kumar Das, Hrudaya Kumar Tripathy, Shafiz Affendi Mohd Yusof |
Người hướng dẫn | Nabendu Chaki, Department of Computer Science and Engineering, Agostino Cortesi, DAIS, Ca’ Foscari University |
Trường học | Indian Institute of Technology Guwahati |
Chuyên ngành | Computer Science and Engineering |
Thể loại | edited volume |
Năm xuất bản | 2021 |
Thành phố | Guwahati |
Định dạng | |
---|---|
Số trang | 219 |
Dung lượng | 6,26 MB |
Nội dung
Ngày đăng: 14/03/2022, 15:31
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết |
---|---|---|
13. Mishra S, Tripathy HK, Mallick PK, Bhoi AK, Barsocchi P (2020) EAGA-MLP—an enhanced and adaptive hybrid classification model for diabetes diagnosis. Sensors 20(14):4036 14. Mishra S, Mallick PK, Jena L, Chae GS (2020) Optimization of Skewed data using sampling-based preprocessing approach. Front Public Health 8:274. https://doi.org/10.3389/fpubh.2020 | Link | |
1. Kotpalliwar MV, Wajgi R (2015) Classification of attacks using support vector machine (svm) on kddcup’99 ids database. In: 2015 Fifth international conference on communication systems and network technologies. IEEE, pp 987–990 | Khác | |
2. Kokila R, Selvi ST, Govindarajan K (2014) Ddos detection and analysis in sdn-based envi- ronment using support vector machine classifier. In: 2014 sixth international conference on advanced computing (ICoAC). IEEE, pp 205–210 | Khác | |
3. Saxena H, Richariya V (2014) Intrusion detection in kdd99 dataset using svm-pso and feature reduction with information gain. Int J Comput Appl 98:6 | Khác | |
4. Chandrasekhar A, Raghuveer K (2014) Confederation of fcm clustering, ann and svm tech- niques to implement hybrid nids using corrected kdd cup 99 dataset. In: 2014 international conference on communication and signal processing. IEEE, pp 672–676 | Khác | |
5. Meng W, Li W, Kwok L-F (2015) Design of intelligent knn-based alarm filter using knowledge- based alert verification in intrusion detection. Secur Commun Netw 8(18):3883–3895 6. Sharifi AM, Amirgholipour SK, Pourebrahimi A (2015) Intrusion detection based on joint ofk-means and knn. J Converg Inform Technol 10(5):42 | Khác | |
7. Koc L, Mazzuchi TA, Sarkani S (2012) A network intrusion detection system based on a hidden nạve bayes multiclass classifier. Exp Syst Appl 39(18):13492–13500 | Khác | |
8. Balogun AO, Jimoh RG (2015) Anomaly intrusion detection using an hybrid of decision tree and k-nearest neighbor | Khác | |
9. Azad C, Jha VK (2015) Genetic algorithm to solve the problem of small disjunct in the decision tree based intrusion detection system. Int J Comput Netw Inform Secur 7(8):56 | Khác | |
10. Jo S, Sung H, Ahn B (2015) A comparative study on the performance of intrusion detection using decision tree and artificial neural network models. J Korea Soc Dig Indus Inform Manag 11(4):33–45 | Khác | |
11. Zhan J, Zulkernine M, Haque A (2008) Random-forests-based network intrusion detection systems. IEEE Trans Syst Man Cybern C 38(5):649–659 | Khác | |
12. Tajbakhsh A, Rahmati M, Mirzaei A (2009) Intrusion detection using fuzzy association rules.Appl Soft Comput 9(2):462–469 | Khác | |
15. Mitchell R, Chen R (2014) Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans Depend Secure Comput 12(1):16–30 16. Hansen JV, Lowry PB, Meservy RD, McDonald DM (2007) Genetic programming for preven-tion of cyberterrorism through dynamic and evolving intrusion detection. Decis Supp Syst 43(4):1362–1374 | Khác | |
17. Kolosnjaji B, Zarras A, Webster G, Eckert C (2016) Deep learning for classification of malware system call sequences. In: Australasian joint conference on artificial intelligence. Springer, New York, pp 137–149 | Khác | |
18. Mishra S, Mahanty C, Dash S, Mishra BK (2019) Implementation of BFS-NB hybrid model in intrusion detection system. In: Recent developments in machine learning and data analytics.Springer, Singapore, pp 167–175 | Khác | |
19. Mishra S, Mohapatra SK, Mishra BK, Sahoo S (2018) Analysis of mobile cloud computing:architecture, applications, challenges, and future perspectives. In: Applications of Security, Mobile, Analytic, and Cloud (SMAC) technologies for effective information processing and management. IGI Global, pp 81–104 | Khác |
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN