|
|
|
Maya Hilda Lestari Louk and Bayu Adhi Tama
As a system capable of monitoring and evaluating illegitimate network access, an intrusion detection system (IDS) profoundly impacts information security research. Since machine learning techniques constitute the backbone of IDS, it has been challenging ...
ver más
|
|
|
|
|
|
|
Maya Hilda Lestari Louk and Bayu Adhi Tama
Gradient boosting ensembles have been used in the cyber-security area for many years; nonetheless, their efficacy and accuracy for intrusion detection systems (IDSs) remain questionable, particularly when dealing with problems involving imbalanced data. ...
ver más
|
|
|
|
|
|
|
Maya Hilda Lestari Louk and Bayu Adhi Tama
Given their escalating number and variety, combating malware is becoming increasingly strenuous. Machine learning techniques are often used in the literature to automatically discover the models and patterns behind such challenges and create solutions th...
ver más
|
|
|
|
|
|
|
Maya Hilda Lestari Louk and Bayu Adhi Tama
Classifier ensembles have been utilized in the industrial cybersecurity sector for many years. However, their efficacy and reliability for intrusion detection systems remain questionable in current research, owing to the particularly imbalanced data issu...
ver más
|
|
|
|