2019
DOI: 10.5815/ijcnis.2019.09.05
|View full text |Cite
|
Sign up to set email alerts
|

A Classification Framework to Detect DoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 20 publications
0
17
0
Order By: Relevance
“…After comparing the results of KC3 dataset (Table 5) with Table [10], it can be seen that the proposed framework with GA, PSO, and LFS outperformed in F-Measure however in MCC, and Accuracy all search methods performed well except RS. In ROC, except RS and LF remaining four methods performed well.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…After comparing the results of KC3 dataset (Table 5) with Table [10], it can be seen that the proposed framework with GA, PSO, and LFS outperformed in F-Measure however in MCC, and Accuracy all search methods performed well except RS. In ROC, except RS and LF remaining four methods performed well.…”
Section: Resultsmentioning
confidence: 99%
“…Many researchers have used machine learning techniques to solve the binary classification problems such as Sentiment Analysis [1,2,3,4,5,6], Rainfall Prediction [7,8], Network Intrusion Detection [9,10], and Software Defect Prediction [11,12,13,14,15,16]. Some of the studies related to software defect prediction are discussed here.…”
Section: Related Workmentioning
confidence: 99%
“…Many researchers have used machine learning techniques to resolve the classification problems in various areas including: sentiment analysis [11,12,13,14,15,16], network intrusion detection [17] "in press" [18], [19], rainfall prediction [20,21], and software defect prediction [10], [29] etc.. Some selected studies regarding the software defect predictions are discussed here briefly.…”
Section: Related Workmentioning
confidence: 99%
“…The process of predicting the defect prone software modules is a binary classification problem. Since last two decades, many researchers have been using the machine learning techniques to solve the problems of binary classification such as: Sentiment Analysis [7,8,9,10,11,12], Rainfall Prediction [13,14], Network Intrusion Detection [15,16], and Software Defect Prediction [1,2,3,4,5,6]. Machine learning techniques are broadly categorized in three classes: 1) Supervised, 2) Unsupervised, and 3) Hybrid [7,8,9].…”
Section: Introductionmentioning
confidence: 99%