Anomaly Detection in Dataset for Improved Model Accuracy Using DBSCAN Clustering Algorithm, pp.39-46, 2015. ,
Firewall policy advisor for anomaly detection and rules, International Symposium on Integrated Network Management, pp.17-30, 2003. ,
DOI : 10.1109/inm.2003.1194157
VAT: a tool for visual assessment of (cluster) tendency, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290), pp.2225-2230, 2002. ,
DOI : 10.1109/IJCNN.2002.1007487
Data mining in cyber threat analysis neural networks for intrusion detection, pp.187-197, 2016. ,
An almost unbiased estimator of the coefficient of variation, Economics Letters, vol.70, issue.1, pp.15-19, 2001. ,
DOI : 10.1016/S0165-1765(00)00351-7
Snort. https://www, 2017. ,
Hybrid Intrusion Detection in Information Systems, 2016 International Conference on Information Science and Security (ICISS), pp.27-32, 2016. ,
DOI : 10.1109/ICISSEC.2016.7885857
URL : https://hal.archives-ouvertes.fr/hal-01380026
A comprehenseive survey on approaches to intrusion detection system, International Conference on Modelling Optimization and Computing, vol.38, pp.2063-2069, 2012. ,
Intrusion Detection System Using PCA and Kernel PCA Methods, International Journal of Computer Science, vol.13, issue.2, pp.72-79, 2016. ,
DOI : 10.1162/089976698300017467
Real detection intrusion using supervised and unsupervised learning, pp.321-326, 2013. ,
TCPdump and Libpcap, 2017. ,
VAFLE: Visual Analytics of Firewall Log Events, Visualization and Data Analysis, 2014. ,
Intrusion Detection Using Decision Tree Based Data Mining Technique, International Journal for Research in Applied Science and Engineering Technology, vol.4, pp.24-28, 2016. ,
Dynamic ant colony system with three level update feature selection for intrusion detection, injs, Journal of Network Security, vol.20, pp.184-192, 2018. ,
Using Modified Partitioning Around Medoids Clustering Technique in Mobile Network Planning, Décision sur les intrusions, pp.10-25, 2013. ,
A data mining framework for building intrusion detection model, IEEE Symposium on Security and Privacy, pp.120-132, 1999. ,
A method for the solution of certain problems in least squares, 1944. ,
An Algorithm for Least-Squares Estimation of Nonlinear Parameters, Journal of the Society for Industrial and Applied Mathematics, vol.11, issue.2, 1963. ,
DOI : 10.1137/0111030
AfterGlow, 2013. ,
A Hybrid Intrusion Detection System Based on C5.0 Decision Tree and One-Class SVM, International Journal of Current Engineering and Technology, vol.5, pp.59-70, 2015. ,
Hybrid approach for Intrusion Detection Using Data Mining, International Journal of Innovative Research in Science, Engineering and Technology, vol.4, pp.5588-5595, 2015. ,
An efficient local region and clustering-based ensemble system for intrusion detection, Proceedings of the 15th Symposium on International Database Engineering & Applications, IDEAS '11, pp.185-191, 2011. ,
DOI : 10.1145/2076623.2076647
URL : https://hal.archives-ouvertes.fr/hal-00631503
A Hybrid approach of Intrusion Detection using ANN and FCM, European Journal Advances in Engineering and Technology, vol.3, pp.6-14, 2016. ,
Intrusion detection system in data mining using hybrid approach, National Conference on Advances in Computing, Communication and Networking, pp.18-21, 1999. ,
Technical Aspects of Cyber Kill Chain, Communications in Computer and Information Science, vol.536, pp.438-452, 2016. ,
DOI : 10.1007/978-3-319-22915-7_40
Network intrusion detection systems, 2006. ,