2014
DOI: 10.1007/s12204-014-1524-4
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection model with twin support vector machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…K-Map is useful for distinction of the data but it is not supported for large volume of data. Support Vector Machine (SVM) [19][20][21][22][23] [ [25][26][27][28][29][30][31][32]: is beneficial for classification and reformation of data, but at the same time SVM only cannot powerfully in recognizing about new data. Given a set of trained-data-set which require more computational time for big-data [4,12].…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…K-Map is useful for distinction of the data but it is not supported for large volume of data. Support Vector Machine (SVM) [19][20][21][22][23] [ [25][26][27][28][29][30][31][32]: is beneficial for classification and reformation of data, but at the same time SVM only cannot powerfully in recognizing about new data. Given a set of trained-data-set which require more computational time for big-data [4,12].…”
Section: B Related Workmentioning
confidence: 99%
“…Fuzzy Logic based techniques found best in detection of intrusion for as compared to Data Mining, K-Map [21], MLP [25][26][27][28][29][30], Random Forest [25][26][27][28][29][30], SVM [32,33], Neural Network [31][32][33] and dimensionality reduction [35][36][37].…”
Section: B Related Workmentioning
confidence: 99%
“…The effectiveness of TWSVM over other existing classification approaches has been validated on various benchmark datasets. TWSVM has better generalization ability and faster computational speed due to which it has been applied to several real life applications such as intrusion detection [60,61], activity recognition [62], image denoising [63], emotion recognition [64], text classification [65], defect prediction [66,67], disease diagnosis [68,69], and speaker identification [70]. Consider a binary classification problem of " " size.…”
Section: Twin Support Vector Machinementioning
confidence: 99%
“…A classifier is constructed by using training data set and its classification ability is checked with the help of testing data set. TWSVM is used for intrusion detection which improves the detection speed and accuracy as well as decrease the time complexity [11,12].…”
Section: In 1990smentioning
confidence: 99%