scispace - formally typeset
F

Fadi Salo

Researcher at University of Western Ontario

Publications -  7
Citations -  551

Fadi Salo is an academic researcher from University of Western Ontario. The author has contributed to research in topics: Intrusion detection system & Anomaly detection. The author has an hindex of 5, co-authored 7 publications receiving 307 citations.

Papers
More filters
Journal ArticleDOI

Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection

TL;DR: Experimental results show that the proposed hybrid dimensionality reduction method with the ensemble of the base learners contributes more critical features and significantly outperforms individual approaches, achieving high accuracy and low false alarm rates.
Journal ArticleDOI

Data mining techniques in social media

TL;DR: The goal of the present survey is to analyze the data mining techniques that were utilized by social media networks between 2003 and 2015 and suggest that more research be conducted by both the academia and the industry since the studies done so far are not sufficiently exhaustive of datamining techniques.
Proceedings ArticleDOI

Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection

TL;DR: An effective anomaly detection framework is proposed utilizing Bayesian Optimization technique to tune the parameters of Support Vector Machine with Gaussian Kernel, Random Forest, and k-Nearest Neighbor algorithms.
Journal ArticleDOI

Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review

TL;DR: The continued ability to detect malicious network intrusions has become an exercise in scalability, in which data mining techniques are playing an increasingly important role and the need for more empirical experiments addressing real-time solutions for big data against contemporary attacks is pointed to.
Proceedings ArticleDOI

Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection

TL;DR: Experimental results show the effectiveness of the proposed framework in detecting previously unseen attack patterns compared to the traditional classification approach.