2019
DOI: 10.1016/j.jisa.2018.11.007
|View full text |Cite
|
Sign up to set email alerts
|

Cyber intrusion detection by combined feature selection algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
82
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 177 publications
(83 citation statements)
references
References 28 publications
1
82
0
Order By: Relevance
“…In [8], a combination of the filter and wrapper approaches have been employed to select the ideal feature subsets from the main dataset. The authors have used the feature grouping concept, which leads to lower variance and greater feature-selection stability.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [8], a combination of the filter and wrapper approaches have been employed to select the ideal feature subsets from the main dataset. The authors have used the feature grouping concept, which leads to lower variance and greater feature-selection stability.…”
Section: Related Workmentioning
confidence: 99%
“…These systems define malicious behavior as an activity which demonstrates a deviation from the regular operation. The most significant benefit that these systems can provide for the users is the influential detection rate of both known and unknown attacks [8]. A proper tuned IDS guarantees deeper insight into networks by providing visibility and control measures to minimize the threats and attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, to accommodate these decentralization and digitalization trends, local distributed control and management techniques are in need [20]. The importance of this issue has led many researchers to seek new methodologies and concepts to improve the performance and security of the power systems [8], [13], [21], [22]. Application of blockchain is one of the newest ones.…”
Section: Fig 1 Power System Changes and Challengesmentioning
confidence: 99%
“…This model decreases the training and testing time in intrusion detection system. Saraet al [11] developed an IDS based feature selection model which integrates both filter and wrapper method. This work used linear correlation coefficient for feature grouping and cuttlefish algorithm correspondingly.…”
Section: Related Workmentioning
confidence: 99%