2014
DOI: 10.14445/22312803/ijctt-v7p106
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Bhavna et al in [35] reviewed several papers applying machine learning techniques to detect cyber threats. However, they have focused and described more on instruction detection.…”
Section: Includedmentioning
confidence: 99%
“…Bhavna et al in [35] reviewed several papers applying machine learning techniques to detect cyber threats. However, they have focused and described more on instruction detection.…”
Section: Includedmentioning
confidence: 99%
“…Dharamkar B. and Singh R.R., in [25], presented various methods of detecting and classifying cyberattacks based on data mining and a neural network approach, as well as criteria for evaluating identifiers and the dataset used to verify identifiers.…”
Section: Brief Overview Of Used Articlesmentioning
confidence: 99%
“…Figure 1 shows an example of FNN composed of n input nodes, m nodes in one hidden layer, and k output nodes. FNN is widely employed as a classification tool in a variety of application domains, including medical analysis, credit scoring, pattern recognition, speech recognition, handwriting recognition, product inspection, drug discovery and development, biological classification, natural language processing, document classification, and network security [6,8,20]. In credit risk assessment, FNN is used to develop credit risk models from the historical data and predict the future corporate bankruptcies [1,2,27].…”
Section: Feedforward Artificial Neural Networkmentioning
confidence: 99%