2023
DOI: 10.1016/j.jisa.2023.103606
|View full text |Cite
|
Sign up to set email alerts
|

A data-driven network intrusion detection system using feature selection and deep learning

Lianming Zhang,
Kui Liu,
Xiaowei Xie
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…where, τ ij (t) represents the pheromone concentration between attribute nodes i and j; ρ represents the pheromone evaporation level, 0 ≤ ρ ≤ 1; ∆τ ij (t) represents the total pheromone left by ants on the path from attribute nodes i to j during each iteration, as shown in Eq. (8).…”
Section: Improved Aco For Attribute Reductionmentioning
confidence: 99%
See 1 more Smart Citation
“…where, τ ij (t) represents the pheromone concentration between attribute nodes i and j; ρ represents the pheromone evaporation level, 0 ≤ ρ ≤ 1; ∆τ ij (t) represents the total pheromone left by ants on the path from attribute nodes i to j during each iteration, as shown in Eq. (8).…”
Section: Improved Aco For Attribute Reductionmentioning
confidence: 99%
“…Currently, the mainstream rule generation methods include association rule mining [7], neural networks [8], and rough sets [9]. Association rule mining algorithm is the most commonly used rule mining method, often used to discover associations in datasets, with the basic idea of analyzing the associations between item sets in the dataset to find frequent item sets and generate association rules.…”
Section: Introductionmentioning
confidence: 99%