{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:30:32Z","timestamp":1754155832731,"version":"3.41.2"},"reference-count":20,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T00:00:00Z","timestamp":1601337600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJPCC"],"published-print":{"date-parts":[[2021,2,19]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The paper aims to precise and fast categorization on to transaction evolves into indispensible. The effective capacity difficulty of all the IDS simulates today at below discovery amount of fewer regular barrage associations and therefore the next warning rate.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The reticulum perception is that the methods which examine and determine the scheme of contact on unearths toward number of dangerous and perchance fateful interchanges occurring toward the system. Within character of guaran-teeing the slumberous, opening and uprightness count of to socialize for professional. The precise and fast categorization on to transaction evolves into indispensible. The effective capacity difficulty of all the intrusion detection simulation (IDS) simulates today at below discovery amount of fewer regular barrage associations and therefore the next warning rate. The container with systems of connections are reproduction everything beacon subject to the series of actions to achieve results accepts exists a contemporary well-known method. At the indicated motivation a hybrid methodology supported pairing distinct ripple transformation and human intelligence artificial neural network (ANN) for IDS is projected. The lack of balance of the situation traversing the space beyond information range was eliminated through synthetic minority oversampling technique-based oversampling have low regular object and irregular below examine of the dominant object. We are binding with three layer ANN is being used for classification, and thus the experimental results on knowledge discovery databases are being used for the facts in occurrence of accuracy rate and disclosure estimation toward identical period. True and false made up accepted.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>At the indicated motivation a hybrid methodology supported pairing distinct ripple transformation and human intelligence ANN for IDS is projected. The lack of balance of the situation traversing the space beyond information range was eliminated through synthetic minority oversampling technique-based oversampling have low regular object and irregular below examine of the dominant object.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Chain interruption discovery is the series of actions for the results knowing the familiarity opening and honor number associate order, the scientific categorization undertaking become necessary. The capacity issues of invasion discovery is the order to determine and examine. The arrangement of simulations at the occasion under discovery estimation for low regular aggression associations and above made up feeling sudden panic amount.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijpcc-05-2020-0036","type":"journal-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T07:39:20Z","timestamp":1601365160000},"page":"64-77","source":"Crossref","is-referenced-by-count":2,"title":["Moving ridge neuronal espionage network simulation for reticulum invasion sensing"],"prefix":"10.1108","volume":"17","author":[{"given":"G.","family":"Sreeram","sequence":"first","affiliation":[]},{"given":"S.","family":"Pradeep","sequence":"additional","affiliation":[]},{"given":"K. Sreenivasa","family":"Rao","sequence":"additional","affiliation":[]},{"given":"B. Deevana","family":"Raju","sequence":"additional","affiliation":[]},{"given":"Parveen","family":"Nikhat","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"key2021043009214214500_ref001","unstructured":"Axelsson, S. (2000), \u201cIntrusion detection systems: A survey and taxonomy. Technical Report\u201d, Technical report."},{"issue":"2","key":"key2021043009214214500_ref002","doi-asserted-by":"crossref","first-page":"1425","DOI":"10.1007\/s11277-015-2459-2","article-title":"Survey of bandwidth estimation techniques in communication networks","volume":"83","year":"2015","journal-title":"Wireless Personal Communications"},{"key":"key2021043009214214500_ref003","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"Smote: synthetic minority over-sampling technique","volume":"16","year":"2002","journal-title":"Journal of Artificial Intelligence Research"},{"key":"key2021043009214214500_ref004","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"SMOTE: synthetic minority over-sampling technique","volume":"16","year":"2002","journal-title":"Journal of Artificial Intelligence Research"},{"volume-title":"Ten Lectures on Wavelets","year":"1992","key":"key2021043009214214500_ref005"},{"issue":"4","key":"key2021043009214214500_ref006","doi-asserted-by":"crossref","first-page":"1937","DOI":"10.1016\/j.eswa.2013.08.089","article-title":"Hybrid decision tree and Na\u00efve Bayes classifiers for multi-class classification tasks","volume":"41","year":"2014","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"key2021043009214214500_ref007","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9734\/BJAST\/2016\/23668","article-title":"Ids using machine learning-current state of art and future directions","volume":"15","year":"2016","journal-title":"British Journal of Applied Science and Technology"},{"issue":"2","key":"key2021043009214214500_ref008","first-page":"251","article-title":"Wavelet neural network model for network intrusion detection system","volume":"11","year":"2014","journal-title":"International Journal of Information Technology"},{"issue":"6","key":"key2021043009214214500_ref009","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1037\/h0071325","article-title":"Analysis of a complex of statistical variables into principal components","volume":"24","year":"1933","journal-title":"Journal of Educational Psychology"},{"key":"key2021043009214214500_ref010","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.jnca.2015.12.004","article-title":"A multi-level intrusion detection method for abnormal network behaviors","volume":"62","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"key":"key2021043009214214500_ref011","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","article-title":"CANN: an intrusion detection system based on combining cluster centers and nearest neighbors","volume":"78","year":"2015","journal-title":"Knowledge-Based Systems"},{"key":"key2021043009214214500_ref012","doi-asserted-by":"publisher","DOI":"10.7287\/peerj.preprints.1954v1","article-title":"A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015","year":"2016","journal-title":"PeerJ Preprints"},{"issue":"16","key":"key2021043009214214500_ref013","first-page":"895","article-title":"Promote liability empathy Bayesian erudition mock-up for inter link vehicle networks","volume":"28","year":"2019","journal-title":"International Journal of Advanced Science and Technology"},{"issue":"1","key":"key2021043009214214500_ref014","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.eswa.2011.06.013","article-title":"Decision tree based light weight intrusion detection using a wrapper approach","volume":"39","year":"2012","journal-title":"Expert Systems with Applications"},{"volume-title":"Foundations of Wavelet Networks and Applications\u201d","year":"2002","key":"key2021043009214214500_ref015"},{"key":"key2021043009214214500_ref016","first-page":"64","article-title":"Deep learning based real object recognition for security in air defence","volume-title":"6th International Conference on Computing for Sustainable Global Development (INDIACom)","year":"2019"},{"key":"key2021043009214214500_ref017","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1016\/j.eswa.2016.07.036","article-title":"OCPAD: One class naive Bayes classifier for payload based anomaly detection","volume":"64","year":"2016","journal-title":"Expert Systems with Applications"},{"first-page":"448","article-title":"Cognitive passive estimation of available bandwidth (cPEAB) in overlapped IEEE 802.11 WiFi WLANs","year":"2010","key":"key2021043009214214500_ref018"},{"issue":"6","key":"key2021043009214214500_ref019","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1049\/iet-com.2008.0078","article-title":"Adaptive wavelet-based multifractal model applied to the effective bandwidth estimation of network traffic flows","volume":"3","year":"2009","journal-title":"IET Communications"},{"issue":"8","key":"key2021043009214214500_ref020","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/TPDS.2012.261","article-title":"Scalable hypergrid k-nn-based online anomaly detection in wireless sensor networks","volume":"24","year":"2013","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-05-2020-0036\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-05-2020-0036\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:05:27Z","timestamp":1753394727000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/17\/1\/64-77\/382513"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,29]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,9,29]]},"published-print":{"date-parts":[[2021,2,19]]}},"alternative-id":["10.1108\/IJPCC-05-2020-0036"],"URL":"https:\/\/doi.org\/10.1108\/ijpcc-05-2020-0036","relation":{},"ISSN":["1742-7371","1742-7371"],"issn-type":[{"type":"print","value":"1742-7371"},{"type":"print","value":"1742-7371"}],"subject":[],"published":{"date-parts":[[2020,9,29]]}}}