Your selections:
Unitary anomaly detection for ubiquitous safety in machine health monitoring
- Amar, Muhammad, Gondal, Iqbal, Wilson, Campbell
- Ting, Kaiming, Zhou, Guang, Liu, Fei, Tan, Swee
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Defying the gravity of learning curve : A characteristic of nearest neighbour anomaly detectors
- Ting, Kaiming, Washio, Takashi, Wells, Jonathan, Aryal, Sunil
Complex anomaly for enhanced machine independent condition monitoring
- Amar, Muhammad, Gondal, Iqbal, Wilson, Campbell
LiNearN : A new approach to nearest neighbour density estimator
- Wells, Jonathan, Ting, Kaiming, Washio, Takashi
Half-space mass : a maximally robust and efficient data depth method
- Chen, Bo, Ting, Kaiming, Washio, Takashi, Haffari, Gholamreza
Isolation-based anomaly detection using nearest-neighbor ensembles
- Bandaragoda, Tharindu, Ting, Kaiming, Albrecht, David, Liu, Fei, Zhu, Ye, Wells, Jonathan
Autonomous behavior modeling approach for diverse anomaly detection application
- Amar, Muhammad, Wilson, Campbell, Gondal, Iqbal
An anomaly intrusion detection system using C5 decision tree classifier
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
Survey of intrusion detection systems : techniques, datasets and challenges
- Khraisat, Ansam, Iqbal, Gondal, Vamplew, Peter, Kamruzzaman, Joarder
Classification under streaming emerging new classes : A solution using completely-random trees
- Mu, Xin, Ting, Kaiming, Zhou, Zhi-Hua
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Khraisat, Ansam, Alazab, Ammar
- Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
Cyberattacks detection in iot-based smart city applications using machine learning techniques
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Hassan, Mohammad, Imam, Tassadduq, Gordon, Steven
A tree-based stacking ensemble technique with feature selection for network intrusion detection
- Rashid, Mamanur, Kamruzzaman, Joarder, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven
- Razzak, Imran, Zafar, Khurram, Imran, Muhammad, Xu, Guandong
Are you sure you would like to clear your session, including search history and login status?