2012
DOI: 10.9790/0661-0563741
|View full text |Cite
|
Sign up to set email alerts
|

Critical analysis of genetic algorithm based IDS and an approach for detecting intrusion in MANET using data mining techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…New techniques to detect cloud system breaches are emerging, like machine learning, tracking user behavior, and cloud-specific technologies. Machine learning, especially LSTM networks, has accurately spotted dangerous threats [21]. However, it takes time to understand how these methods work, and in certain situations, additional data is needed before they can be used.…”
Section: B Challenges and Opportunities In Emerging Approachesmentioning
confidence: 99%
“…New techniques to detect cloud system breaches are emerging, like machine learning, tracking user behavior, and cloud-specific technologies. Machine learning, especially LSTM networks, has accurately spotted dangerous threats [21]. However, it takes time to understand how these methods work, and in certain situations, additional data is needed before they can be used.…”
Section: B Challenges and Opportunities In Emerging Approachesmentioning
confidence: 99%