2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS) 2016
DOI: 10.1109/acosis.2016.7843930
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system using PCA and Fuzzy PCA techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 41 publications
(20 citation statements)
references
References 5 publications
0
20
0
Order By: Relevance
“…For feature extraction they have used PCA and LDA algorithms. Fuzzy based PCA is used to make IDS [9]. To classify K nearest neighbor is used.…”
Section: A Cascading Layered Approach For Intrusion Detection To Improve Detection Accuracy Of Major and Minor Attacksmentioning
confidence: 99%
“…For feature extraction they have used PCA and LDA algorithms. Fuzzy based PCA is used to make IDS [9]. To classify K nearest neighbor is used.…”
Section: A Cascading Layered Approach For Intrusion Detection To Improve Detection Accuracy Of Major and Minor Attacksmentioning
confidence: 99%
“…Now our ultimate aim is to have a projection matrix W that can minimize the value of the objective function (13). 2 unknown variables W and d i existing in the objective function (13).…”
Section: Nonlinear 2p -Norm Pca Algorithmmentioning
confidence: 99%
“…Now our ultimate aim is to have a projection matrix W that can minimize the value of the objective function (13). 2 unknown variables W and d i existing in the objective function (13). Hence, it will not accept a closed-form solution & it is hard to straightforwardly solve the solution of the objective function (13).…”
Section: Nonlinear 2p -Norm Pca Algorithmmentioning
confidence: 99%
See 2 more Smart Citations