최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on software and data engineering. 소프트웨어 및 데이터 공학, v.9 no.12, 2020년, pp.411 - 418
류경준 (세종대학교 컴퓨터공학과) , 신동일 (세종대학교 컴퓨터공학과) , 신동규 (세종대학교 컴퓨터공학과) , 박정찬 (국방과학연구소) , 김진국 (국방과학연구소)
In the field of information security, IDS(Intrusion Detection System) is normally classified in two different categories: signature-based IDS and anomaly-based IDS. Many studies in anomaly-based IDS have been conducted that analyze network traffic data generated in cyberspace by machine learning alg...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
V. Kanimozhi, and T. P. Jacob, "Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSECIC-IDS2018 using cloud computing," In: 2019 International Conference on Communication and Signal Processing (ICCSP). IEEE, pp.0033-0036, 2019.
J. H. Seo, "A comparative study on the classification of the imbalanced intrusion detection dataset based on deep learning," Journal of Korean Institute of Intelligent Systems, Vol.28, No.2, pp.152-159, 2018.
M. H. Abdulraheem and N. B. Ibraheem, "A detailed analysis of new intrusion detection dataset," Journal of Theoretical and Applied Information Technology, Vol.97, No.17, 2019.
B. Alsughayyir, A. M. Qamar, and R. Khan, "Developing a Network Attack Detection System Using Deep Learning," In: 2019 International Conference on Computer and Information Sciences (ICCIS). IEEE. pp.1-5, 2019.
Q. Zhou and D. Pezaros, "Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection--An Analysis on CIC-AWS-2018 dataset," arXiv preprint arXiv: 1905.03685, 2019.
B. K. Singh, K. Verma, and A. S. Thoke, "Investigations on impact of feature normalization techniques on classifier's performance in breast tumor classification," International Journal of Computer Applications, Vol.116, No.19, 2015.
Z. Liu and W. Li, "A method of SVM with normalization in intrusion detection," Procedia Environmental Sciences, Vol.11, pp.256-262, 2011.
scikit-learn.org [Internet], https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.StandardScaler.html
S. C. Hicks and R. A. Irizarry, "When to use quantile normalization?," BioRxiv, 2014.
scikit-learn.org [Internet], https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.quantile_transform.html
P. Devan and N. Khare, "An efficient XGBoost-DNN-based classification model for network intrusion detection system," Neural Computing and Applications, 1-16, 2020.
N. Qazi and K. Raza, "Effect of feature selection, SMOTE and under sampling on class imbalance classification," In: 2012 UKSim 14th International Conference on Computer Modelling and Simulation. IEEE. pp.145-150, 2012.
I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization," In: ICISSP. pp.108-116, 2018.
J. M. Cadenas, M. C. Garrido, and R. MartiNez, "Feature subset selection filter-wrapper based on low quality data," Expert Systems with Applications, Vol.40, No.16, pp.6241-6252, 2013.
H. Min and Wu. Fangfang, "Filter-wrapper hybrid method on feature selection," In: 2010 Second WRI Global Congress on Intelligent Systems. IEEE. pp.98-101, 2010.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.