2019
DOI: 10.1016/j.comcom.2019.08.003
|View full text |Cite
|
Sign up to set email alerts
|

Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 65 publications
(15 citation statements)
references
References 6 publications
0
14
0
1
Order By: Relevance
“…Moreover, ML has got significant importance in the field of cyber security [17]. Different machine learning techniques namely, Bayesian Networks [18], Decision Trees [19,20], Artificial Neural Networks [21,22], Association Rule [23,24], Support Vector Machine [25,26], Regression Trees [27], K-nearest neighbors [28,29], Random Forest [30,31] have been implemented to detect and predict cyber intrusions. But there are very few research studies that try to explore machine learning approaches to detect suspicious access or intrusions to EHR systems.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, ML has got significant importance in the field of cyber security [17]. Different machine learning techniques namely, Bayesian Networks [18], Decision Trees [19,20], Artificial Neural Networks [21,22], Association Rule [23,24], Support Vector Machine [25,26], Regression Trees [27], K-nearest neighbors [28,29], Random Forest [30,31] have been implemented to detect and predict cyber intrusions. But there are very few research studies that try to explore machine learning approaches to detect suspicious access or intrusions to EHR systems.…”
Section: Introductionmentioning
confidence: 99%
“…FSA prevents the collision by ensuring that none of the neighboring node gets the same slot. Nodes (Arivudainambi et al , 2019b) which are separated by two or more hopes can get assigned in the same slot, thereby preventing the collision. To achieve fairness at the scheduling level, the FSA maintains four different states for each node as IDLE, REQUEST, GRANT and RELEASE.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…The transformed principal components might not always align with the features that are most relevant for specific detection tasks. In [17], certain cases, using PCA alone for feature selection might discard discriminative information, leading to reduced detection accuracy.…”
Section: Literature Reviewmentioning
confidence: 99%