1. Mac Dermott, A.M., Shi, Q., and Kifayat, K. Collaborative Intrusion Detection in Federated Cloud Environments. Journal of Computer Sciences and Applications, vol. 3, no. 3A, pp. 10-20, 2015. 2. Krishnaveni S., Sivamohan S., Sridhar S.S., andPrabakaran S.Efficient Feature Selection and Classification through Ensemble Method for Network Intrusion Detection on Cloud Computing. Cluster Computing, vol. 24, no. 3, pp. 1761-1779, 2021. 3. Banerjee, T.J. and Shah, S., Detection of DoS and DDoS Attacks using Neural Network. 4. Abusitta A., Bellaiche M., Dagenais M., andHalabi T.A Deep Learning Approach for Proactive Multi-Cloud Cooperative Intrusion Detection System. Future Generation Computer Systems, vol. 98, pp. 308-318, 2019. 5. Abdullayeva F.J.Distributed Denial of Service Attack Detection in E-Government Cloud via Data Clustering. Array, vol.15, p.100229, 2022. 6. Chen C., Song Y., Yue S., Xu X., Zhou L., Lv Q., andYang L.Fcnn-Se: An Intrusion Detection Model based on a Fusion CNN and Stacked Ensemble. Applied Sciences, vol. 12, no. 17, pp. 8601, 2022. 7. Binbusayyis, A. and Vaiyapuri, T.Unsupervised Deep Learning Approach for Network Intrusion Detection Combining Convolutional Autoencoder and One-Class SVM. Applied Intelligence, vol. 51, no. 10, pp. 7094-7108, 2021. 8. Tsai, C.F. and Lin, W.C.Feature Selection and Ensemble Learning Techniques in One-Class Classifiers: An Empirical Study of Two-Class Imbalanced Datasets. IEEE Access, vol. 9, pp. 13717-13726, 2021. 9. Kim G., Lee S., andKim S.A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection with Misuse Detection. Expert Systems with Applications, vol. 41, no. 4, pp. 1690-1700, 2014. 10. Mugabo, E. and Zhang, Q.Y.Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing. International Journal of Network Security, vol. 22, no. 2, pp. 231-241, 2020. 11. Jaber, A.N. and Rehman, S.U.FCM-SVM Based Intrusion Detection System for Cloud Computing Environment. Cluster Computing, vol. 23, pp. 3221-3231, 2020. 12. Chakravarthi, S.S. and Kannan, R.J.RETRACTED: Detection of Anomalies in Cloud Services using Network Flowdata Analysis.The International Journal of Electrical Engineering & Education, pp. 0020720920901436, 2020. 13. Gu, J. and Lu, S.An Effective Intrusion Detection Approach using SVM with NaïVe Bayes Feature Embedding. Computers & Security, vol. 103, pp. 102158, 2021. 14. Jia H., Liu J., Zhang M., He X., andSun W.Network Intrusion Detection based on IE-DBN Model. Computer Communications, vol. 178, pp. 131-140, 2021. 15. Thilagam, T. and Aruna, R.Intrusion Detection for Network Based Cloud Computing by Custom RC-NN and Optimization. ICT Express, vol. 7, no. 4, pp. 512-520, 2021. 16. Mayuranathan M., Saravanan S.K., Muthusenthil B., andSamydurai A.An Efficient Optimal Security System for Intrusion Detection in Cloud Computing Environment using Hybrid Deep Learning Technique. Advances in Engineering Software, vol. 173, pp. 103236, 2022. 17. Samriya J.K., Tiwari R., Cheng X., Singh R.K., Shankar A., andKumar M.Network Intrusion Detection using ACO-DNN Model with DVFS Based Energy Optimization in Cloud Framework. Sustainable Computing: Informatics and Systems, vol. 35, pp. 100746, 2022. 18. Mebawondu J.O., Alowolodu O.D., Mebawondu J.O., andAdetunmbi A.O.Network Intrusion Detection System using Supervised Learning Paradigm. Scientific African, vol. 9, pp. 00497, 2020. 19. Lantz B.Machine learning with R: expert techniques for predictive modeling. Packt publishing ltd, 2019. 20. De Souza, C.A., Westphall, C.B., Machado, R.B., Sobral, J.B.M., and dos Santos Vieira, G. Hybrid Approach to Intrusion Detection in Fog-Based IoT Environments. Computer Networks, vol. 180, pp. 107417, 2020. 21. Ahmed M., Mahmood A.N., andHu J.A Survey of Network Anomaly Detection Techniques. Journal of Network and Computer Applications, vol. 60, pp. 19-31, 2016. |