2017 International Conference on Engineering &Amp; MIS (ICEMIS) 2017
DOI: 10.1109/icemis.2017.8273116
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary approach for intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…It can be split into two parts: selecting features and getting information about them. Gunupudi et.al [32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54] discusses various dimensionality reductions and data transformation techniques used for various learning methods in their proposed research work. Rybus et al in thier proposed method creates a path for the arm that avoids collisions and leads to the gripper being in the right place and facing the right way and the spacecraft being in the right attitude.…”
Section: Related Workmentioning
confidence: 99%
“…It can be split into two parts: selecting features and getting information about them. Gunupudi et.al [32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54] discusses various dimensionality reductions and data transformation techniques used for various learning methods in their proposed research work. Rybus et al in thier proposed method creates a path for the arm that avoids collisions and leads to the gripper being in the right place and facing the right way and the spacecraft being in the right attitude.…”
Section: Related Workmentioning
confidence: 99%
“…To see the future perspective of the proposed work, it can be figured out traditionally, the current deep learning applications have considered existing distance functions in the research literature for similarity computations but did not try to fit in new functions for similarity computations [46][47][48][49][50]. There is a possibility to devise threshold and similarity functions to suit deep learning applications [51][52][53][54][55]. For instance, recent research contributions propose various similarity and threshold functions for temporal pattern mining which can be redesigned to suit deep learning applications [56][57][58][59][60].…”
Section: Proposed Neural Architecturementioning
confidence: 99%
“…The purpose of access control and Intrusion detection system is to identify the genuineness. Some researchers have worked in the area of intrusion detection for finding the correctness of the inquirer [29] [30] [31] [32] [33]. These works were very helpful to get an insight of various methods of identifying the genuineness of the requester.…”
Section: Machine Learningmentioning
confidence: 99%