Sensor Data Analysis and Management 2021
DOI: 10.1002/9781119682806.ch3
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Feature Selection Techniques in Intrusion Detection Systems Using Machine Learning Models in Wireless Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Intrusion detection is becoming a vital approach for screening system movements and identifying attacks in network like anomalous networks, unwanted network access, and hostile attack on computer system. A major segment of present arrangements adheres to systems, but they do not react to unexpected conditions [3]. There are two types of IDS: misuse and anomaly-based IDS.…”
Section: Introductionmentioning
confidence: 99%
“…Intrusion detection is becoming a vital approach for screening system movements and identifying attacks in network like anomalous networks, unwanted network access, and hostile attack on computer system. A major segment of present arrangements adheres to systems, but they do not react to unexpected conditions [3]. There are two types of IDS: misuse and anomaly-based IDS.…”
Section: Introductionmentioning
confidence: 99%