ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Anomaly
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
253
Preecha Somwang1, 2 and Woraphon Lilakiatsakun2 1Office of Academic Resources and Information Techno logy, Rajamangala University
# IDS
# network security
# PCA
# SFAM
Immunity inspired Cooperative Agent based
Department of Computer Science and Engineering, Technocrats Institute of Technology, India
#Anomaly
# human immune system
# artificial immune system
# agent
FAAD: A Self-Optimizing Algorithm for Anomaly Detection
Adeel Hashmi and Tanvir Ahmad
#Anomaly detection
# outliers
# firefly algorithm
# big data
# parallel algorithms and apache spark
Ensemble Voting based Intrusion Detection Technique using Negative Selection Algorithm
Kuldeep Singh,Lakhwinder Kaur,Raman Maini
#Artificial immune system
#security
#negative selection algorithm
#anomaly detection
A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-
Based IIoT Security, Mourade Azrour, Said Benkirane, Mouaad Mohy-Eddine, Hanaa Attou, Maryam Douiba
#IoT security
# edge-based IIoT
# intrusion detection
# ML
# K-NN
# PCA
A Modified DBSCAN Algorithm for Anomaly Detection in Time-series Data with Seasonality
Praphula Jain,Mani Shankar Bajpai,Rajendra Pamula
#Anomaly detection
#data mining
#DBSCAN
#modified DBSCAN
#seasonal data
#time series
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint