Your selections:
Complex anomaly for enhanced machine independent condition monitoring
- Amar, Muhammad, Gondal, Iqbal, Wilson, Campbell
Survey of intrusion detection systems : techniques, datasets and challenges
- Khraisat, Ansam, Iqbal, Gondal, Vamplew, Peter, Kamruzzaman, Joarder
- Ting, Kaiming, Zhou, Guang, Liu, Fei, Tan, Swee
An anomaly intrusion detection system using C5 decision tree classifier
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Unitary anomaly detection for ubiquitous safety in machine health monitoring
- Amar, Muhammad, Gondal, Iqbal, Wilson, Campbell
Classification under streaming emerging new classes : A solution using completely-random trees
- Mu, Xin, Ting, Kaiming, Zhou, Zhi-Hua
Isolation-based anomaly detection using nearest-neighbor ensembles
- Bandaragoda, Tharindu, Ting, Kaiming, Albrecht, David, Liu, Fei, Zhu, Ye, Wells, Jonathan
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
Autonomous behavior modeling approach for diverse anomaly detection application
- Amar, Muhammad, Wilson, Campbell, Gondal, Iqbal
LiNearN : A new approach to nearest neighbour density estimator
- Wells, Jonathan, Ting, Kaiming, Washio, Takashi
Defying the gravity of learning curve : A characteristic of nearest neighbour anomaly detectors
- Ting, Kaiming, Washio, Takashi, Wells, Jonathan, Aryal, Sunil
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
Half-space mass : a maximally robust and efficient data depth method
- Chen, Bo, Ting, Kaiming, Washio, Takashi, Haffari, Gholamreza
Are you sure you would like to clear your session, including search history and login status?