2021
DOI: 10.1007/s10489-020-02090-8
|View full text |Cite
|
Sign up to set email alerts
|

A weighted intrusion detection model of dynamic selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…We denote X, Y as the two discrete random variables, the joint probability mass function p (x, y) and marginal probability p(x), p(y), and the antibody information entropy of X is defined as (Feng & Dou, 2021):…”
Section: The Antibody Information Entropy H (X)mentioning
confidence: 99%
See 1 more Smart Citation
“…We denote X, Y as the two discrete random variables, the joint probability mass function p (x, y) and marginal probability p(x), p(y), and the antibody information entropy of X is defined as (Feng & Dou, 2021):…”
Section: The Antibody Information Entropy H (X)mentioning
confidence: 99%
“…The cooperative evolution mechanism of multiple operators includes antibody similarity evaluation operator, antibody fitness evaluation operator and population variation adjustment operator to determine the current populationism of multiple operators includes anti (Feng & Dou, 2021;Xi et al, 2021).…”
Section: The Cooperative Evolution Mechanism Of Multiple Operatorsmentioning
confidence: 99%
“…H2ID [31] presents a two-stage hierarchical hybrid intrusion detection algorithm by incorporating multimodel deep autoencoder and soft-output classifiers to detect attacks in IoT and preserve privacy. WIDMoDS [32] aims to customize multiple intrusion detection models for the property of networks.…”
Section: Related Workmentioning
confidence: 99%
“…The network intrusion detection can actively monitor network events to identify security issues occured in the network [3]. Therefore, intrusion detection is one of key techniques for network security research [4].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, many intrusion detection methods have been proposed, such as expert system detection intrusion technology, which matches the observed data with the predefined descriptions of intrusion features [6]. It can recognize attacks in the signature database, but ineffective for detecting unknown attacks.…”
Section: Introductionmentioning
confidence: 99%