Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    AI-Assisted Enhanced Composite Metric-Based Intrusion Detection System for Secured Cyber Internet Security for Next-Generation Wireless Networks

  • articleNo Access

    Modified Whale Algorithm and Morley PSO-ML-Based Hyperparameter Optimization for Intrusion Detection

  • articleNo Access

    A NEURAL-VISUALIZATION IDS FOR HONEYNET DATA

  • articleNo Access

    A Continuous Learning Approach for Real-Time Network Intrusion Detection

  • articleNo Access

    Performance Evaluation of Data-Centric Networks Based on Parallel and Distributed Architectures for Machine Intelligence Research

  • articleNo Access

    COMPUTER INTRUSION DETECTION WITH CLASSIFICATION AND ANOMALY DETECTION, USING SVMs

  • articleNo Access

    A Feature Selection Method for Improved Clonal Algorithm Towards Intrusion Detection

  • articleNo Access

    Intrusion Detection Based on Dynamic Gemini Population DE-K-mediods Clustering on Hadoop Platform

  • articleNo Access

    Unraveling the Potential: A Systematic Review and Performance Evaluation of Data-Driven Network Anomaly Detection Techniques

  • articleNo Access

    ShNFN: Shepard Neuro-Fuzzy Network for Intrusion Detection in Fog Computing

  • articleNo Access

    Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine

  • articleNo Access

    Group-Based Federated Knowledge Distillation Intrusion Detection

  • articleNo Access

    LOW-EFFORT LABELING OF NETWORK EVENTS FOR INTRUSION DETECTION IN WLANS

  • articleNo Access

    A Neural Network Ensemble Classifier for Effective Intrusion Detection Using Fuzzy Clustering and Radial Basis Function Networks

  • articleNo Access

    Intrusion Detection Using Bat Optimization Algorithm and DenseNet for IoT and Cloud Based Systems

  • articleNo Access

    ACTIVE LEARNING TO DEFEND POISONING ATTACK AGAINST SEMI-SUPERVISED INTRUSION DETECTION CLASSIFIER

  • articleNo Access

    Evaluating Feature Selection Methods for Network Intrusion Detection with Kyoto Data

  • articleNo Access

    Detecting Network Attacks Based on Behavioral Commonalities

  • articleNo Access

    Predicting Cyberattacks with Destination Port Through Various Input Feature Scenario

  • articleNo Access

    A Hybrid SDN Architecture for IDS Using Bio-Inspired Optimization Techniques