5   Artículos

 
en línea
Maya Hilda Lestari Louk and Bayu Adhi Tama    
As a system capable of monitoring and evaluating illegitimate network access, an intrusion detection system (IDS) profoundly impacts information security research. Since machine learning techniques constitute the backbone of IDS, it has been challenging ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Maya Hilda Lestari Louk and Bayu Adhi Tama    
Gradient boosting ensembles have been used in the cyber-security area for many years; nonetheless, their efficacy and accuracy for intrusion detection systems (IDSs) remain questionable, particularly when dealing with problems involving imbalanced data. ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Maya Hilda Lestari Louk and Bayu Adhi Tama    
Given their escalating number and variety, combating malware is becoming increasingly strenuous. Machine learning techniques are often used in the literature to automatically discover the models and patterns behind such challenges and create solutions th... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Maya Hilda Lestari Louk and Bayu Adhi Tama    
Classifier ensembles have been utilized in the industrial cybersecurity sector for many years. However, their efficacy and reliability for intrusion detection systems remain questionable in current research, owing to the particularly imbalanced data issu... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »