- [1] Mehanović, D.; Kečo, D.; Kevrić, J.; Jukić, S.; Miljković, A.; Mašetić, Z. “Feature Selection Using Cloud-based Parallel Genetic Algorithm for Intrusion Detection Data Classification”; Neural Computing and Applications 2021, 33, 11861-11873.
- [2] Najafi, M.; Rafeh, R. “A New Light Weight Intrusion Detection Algorithm for Computer Networks”; Adv. Defence Sci.& 2017, 10, 191-200 (In Persian).
- [3] Dubey, G. P.; Bhujade, R. K. “Optimal Feature Selection for Machine Learning Based Intrusion Detection System by Exploiting Attribute Dependence”; Materials Today: Proc. 2021, 47, 6325-6331.
- [4] Kamalov, F.; Moussa, S.; Zgheib, R.; Mashaal, O. “Feature Selection for Intrusion Detection Systems”; 13th Symp. on Computational Intelligence and Design, IEEE, 2020.
- [5] Shakeela, S.; Shankar, N. S.; Reddy, P. M.; Tulasi, T. K.; Sai, M. M. “Optimal Ensemble Learning Based on Distinctive Feature Selection by Univariate ANOVA-F Statistics for IDS”; Int. J. of Electronics and Telecommunications 2021, 67, 267-275.
- [6] Ibrahim, Z. K.; Thanon, M. Y. “Performance Comparison of Intrusion Detection System Using Three Different Machine Learning Algorithms”; 6th Conf. on Inventive Computation Tech., IEEE, 2021.
- [7] Kalimuthan, C.; Renjit, J. A. “Review on Intrusion Detection Using Feature Selection with Machine Learning Techniques”; Materials Today: Proc. 2020, 33, 3794-3802.
- [8] Tajari Siahmarzkooh, A. A. “Intrusion Detection in Computer Networks Using Decision Tree and Feature Reduction”; Electron. Cyber Defence 2017, 9, 99-108 (In Persian).
- [9] Sarhan, M.; Layeghy, S.; Portmann, M. “Towards a Standard Feature Set for Network Intrusion Detection System Datasets”; Mobile Networks and Applications 2021, 1-14.
- [10] Moualla, S.; Khorzom, K.; Jafar, A. “Improving the Performance of Machine Learning-based Network Intrusion Detection Systems on the UNSW-NB15 Dataset”; Computational Intelligence and Neuroscience 2021, 1-13.
- [11] Khafajeh, H. A. Y. E. L. “An Efficient Intrusion Detection Approach Using Light Gradient Boosting”; J. Theor. Appl. Inform. Technol. 2020, 98, 825-835.
- [12] Çalışır, S.; Atay, R.; Pehlivanoğlu, M. K.; Duru, N. “Intrusion Detection Using Machine Learning and Deep Learning Techniques”; 4th Conf. Comput. Sci. Eng., IEEE, 2019.
- [13] Taheri, R.; Parsaei, M. R.; Javidan, R. “Real-Time Intrusion Detection System Using a Combination of Discretization and Feature Selection”; Adv. Defence Sci. & Technol. 2017, 10, 251-263 (In Persian).
- [14] Mohammadi, M.; Rashid, T. A.; Karim, S. H. T.; Aldalwie, A. H. M.; Tho, Q. T.; Bidaki, M.;... Hosseinzadeh, M. “A Comprehensive Survey and Taxonomy of the SVM-based Intrusion Detection Systems”; J. Network Comput. App. 2021, 178, 102983.
- [15] Alizadeh, M.; Beheshti, M. T.; Ramezani, A.; Saadatinezhad, H. “Network Traffic Forecasting Based on Fixed Telecommunication Data Using Deep Learning”; 6th Iranian Conf. Signal Proc. Intell. Syst., IEEE, 2020.
- [16] Thakkar, A.; Lohiya, R. “A Survey on Intrusion Detection System: Feature Selection, Model, Performance Measures, Application Perspective, Challenges, and Future Research Directions”; Artificial Intelligence Review 2021, 1-111.
- [17] Sultana, N.; Chilamkurti, N.; Peng, W.; Alhadad, R. “Survey on SDN Based Network Intrusion Detection System Using Machine Learning Approaches”; Peer-to-Peer Networking 2019, 12, 493-501.
- [18] Alizadeh, M.; Mousavi, S. E.; Beheshti, M. T.; Ostadi, A. “Combination of Feature Selection and Hybrid Classifier for Network Intrusion Detection System Based on GWO, BAT, and FA Algorithms”; 6th Iranian Conf. Signal Proc. Syst., IEEE, 2020.
- [19] Desale, K. S.; Ade, R. “Genetic Algorithm Based Feature Selection Approach for Effective Intrusion Detection System”; Int. Conf. Comput. Commun. Inform., IEEE, 2015.
- [20] Saba, T.; Sadad, T.; Rehman, A.; Mehmood, Z.; Javaid, Q. “Intrusion Detection System through Advance Machine Learning for the Internet of Things Networks”; IT Prof. 2021, 23, 58-64.
- [21] Lin, C.; Li, A.; Jiang, R. “Automatic Feature Selection and Ensemble Classifier for Intrusion Detection”; J. Phys.: Conf. Series Vol. 1856. No. 1. IOP Publishing, 2021.
- [22] Dey, S. K.; Rahman, M. M. “Flow Based Anomaly Detection in Software Defined Networking: a Deep Learning Approach with Feature Selection Method”; 4th Conf. Electrical Eng. Inform. & Commun. Tech., IEEE, 2018.
- [23] Selvakumar, B.; Muneeswaran, K. “Firefly Algorithm Based Feature Selection for Network Intrusion Detection”; Computers & Security 2019, 81, 148-155.
- [24] Mohammadi, S.; Desai, V.; Karimipour, H. “Multivariate Mutual Information-based Feature Selection for Cyber Intrusion Detection”; IEEE Electrical Power and Energy Conf., IEEE, 2018.
- [25] Abhale, A. B.; Manivannan, S. S. “Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network”; Optical Memory and Neural Networks 2020, 29, 244-256.
- [26] Faker, O.; Dogdu, E. “Intrusion Detection Using Big Data and Deep Learning Techniques”; Proc. 2019 ACM Southeast Conf. 2019.
- [27] Dobson, A.; Roy, K.; Yuan, X.; Xu, J. “Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection”; 28th Telecommun. Networks App. Conf., IEEE, 2018.
- [28] Afuwape, A. A.; Xu, Y.; Anajemba, J. H.; Srivastava, G. “Performance Evaluation of Secured Network Traffic Classification Using a Machine Learning Approach”; Computer Standards & Interfaces 2021, 78, 103545.
- [29] Alrowaily, M.; Alenezi, F.; Lu, Z. “Effectiveness of Machine Learning Based Intrusion Detection Systems”; Int. Conf. Security, Privacy and Anonymity in Computation, Communication and Storage, Springer, Cham, 2019.
- [30] Dhanabal, L.; Shantharajah, S. P. “A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification ALlgorithms”; Int. J. Adv. Res. Comput. Commun. Eng. 2015, 4, 446-452.
- [31] Wang, Z.; Tang, M.; Deng, J.; Wang, Y.; Qian, J., Chen, X. “A New Feature Selection Method for Intrusion Detection”; Int. Conf. Ubiquitous Comput. & Commun. and Data Sci. and Computational Intelligence and Smart Computing, Networking and Services, IEEE, 2019.
- [32] Sharifiasn, M.; Karshenas, H.; Sharifiasn, S. “Improving Network Intrusion Detection by Identifying Effective Features using Evolutionary Algorithms based on Support Vector Machine”; Comput. Intell. Electrical Eng. 2020, 11, 29-42.
- [33] Alkafagi, S. S.; Almuttairi; R. M. “A Proactive Model for Optimizing Swarm Search Algorithms for Intrusion Detection System”; J. Phys.: Conf. Series, Vol. 1818, IOP Publishing, 2021.
|