References
- Nalavade K. and Meshram B. "Intrusion prevention systems: data mining approach." In proceedings of the International Conference and Workshop on Emerging Trends in Technology, 2010, pp. 211-214, doi:https://doi-org.ezproxy.emich.edu/10.1145/1741906.1741952
- Pham T., et al. "Generating Artificial Attack Data for Intrusion Detection Using Machine Learning." In proceedings of the Fifth Symposium on Information and Communication Technology, 2014, pp. 286-291, doi:https://doi-org.ezproxy.emich.edu/10.1145/2676585.2676618
- Foroushani A. and Li Y. "Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique." In proceedings of the 2018 7th International Conference on Software and Computer Applications, 2018, pp. 119- 123, doi:https://doi-org.ezproxy.emich.edu/10.1145/3185089.3185114
- Chapke P. and Deshmukh R. "Intrusion detection system using fuzzy logic and data mining technique." In proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology, 2015, pp. 1-5, doi:https://doi-org.ezproxy.emich.edu/10.1145/2743065.2743128
- Li Y., et al. "Intrusion detection algorithm based on deep learning for industrial control networks." In proceedings of the 2019 The 2nd International Conference on Robotics, Control and Automation Engineering, 2019, pp. 40-44, doi:https://doi-org.ezproxy.emich.edu/10.1145/3372047.3372092
- Belouch M. and Hadaj S. "Comparison of ensemble learning methods applied to network intrusion detection." proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, 2017, pp. 1-4, doi:https:// doi-org.ezproxy.emich.edu/10.1145/3018896.3065830
- Yu Y., et al. "Attacks and Defenses towards Machine Learning Based Systems." proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018, pp. 1-7, doi:https://doi-org.ezproxy.emich.edu/10.1145/3207677.3277988
- Tungjaturasopon P. and Piromsopa K. "Performance Analysis of Machine Learning Techniques in Intrusion Detection." In proceedings of the 2018 VII International Conference on Network, Communication and Computing, 2018, pp. 6-10., doi:https://doi-org.ezproxy.emich.edu/10.1145/3301326.3301335
- Hamid Y., et al. "Machine Learning Techniques for Intrusion Detection." In Proceedings of the International Conference on Informatics and Analytics, 2016, Article 53, pp. 1-6, doi:https://doi-org.ezproxy.emich.edu/10.1145/2980258.2980378
- Gunupudi R., Mangathayaru N., and Narasimha G. "Intrusion Detection Using Text Processing Techniques." In proceedings of the The International Conference on Engineering & MIS, 2015, Article 55, pp. 1-6 doi:https://doi-org.ezproxy.emich.edu/10.1145/2832987.2833067
- Khanji S. and Khattak A. "Towards a Novel Intrusion Detection Architecture Using Artificial Intelligence." In Proceedings of the 2020 9th International Conference on Software and Information Engineering , 2020, pp. 185-189., doi:https://doi-org.ezproxy.emich.edu/10.1145/3436829.3436842
- Anand V. "Intrusion Detection: Tools, Techniques and Strategies." In proceedings of the 42nd annual ACM SIGUCCS conference on User services, 2014, pp. 69-73, doi:https://doi-org.ezproxy.emich.edu/10.1145/2661172.2661186
- Jafier S. "Utilizing feature selection techniques in intrusion detection system for internet of things." In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018, pp. 1-3, doi:https://doi-org.ezproxy.emich.edu/10.1145/3231053.3234323
- Mbarek B., et al. "Enhanced Network Intrusion Detection System Protocol for Internet of Things." In Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, pp. 1156-1163, doi:https://doi-org.ezproxy.emich.edu/10.1145/3341105.3373867
- Aneetha A., et al. "Hybrid Network Intrusion Detection System Using Expert Rule Based Approach." In proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, 2012, pp. 47-51, doi:https://doi-org.ezproxy.emich.edu/10.1145/2393216.2393225