2014
DOI: 10.1007/978-3-319-10840-7_60
|View full text |Cite
|
Sign up to set email alerts
|

Erratum: Ensemble-Distributed Approach in Classification Problem Solution for Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Heuristics and meta-heuristics methods are still implemented in several works, which are generally based on greedy algorithm: [64], and genetic algorithms [28,91]. Also, the combination of heuristic and meta-heuristic methods and machine learning techniques was considered, such as in [28]. Such approaches allowed security systems to be more accurate and more efficient.…”
Section: Discussion Open Issues and Recommendationsmentioning
confidence: 99%
See 3 more Smart Citations
“…Heuristics and meta-heuristics methods are still implemented in several works, which are generally based on greedy algorithm: [64], and genetic algorithms [28,91]. Also, the combination of heuristic and meta-heuristic methods and machine learning techniques was considered, such as in [28]. Such approaches allowed security systems to be more accurate and more efficient.…”
Section: Discussion Open Issues and Recommendationsmentioning
confidence: 99%
“…Machine learning techniques are still extensively used in many recent work, and that given the great potential of these techniques to address the problems inherent in IDS and CIDS. The most used ML techniques are: Neural Networks [28,165,166], Bayesian Networks [152,64], SVM [177,188], Decision Trees [50,177], and Deep Learning [109].…”
Section: Discussion Open Issues and Recommendationsmentioning
confidence: 99%
See 2 more Smart Citations