Transfer Learning Technique: An Approach For Network Intrusion Detection
Abstract
Keywords
Full Text:
PDFReferences
Abayomi-Alli, A. A., Ikuomola, A. I., Robert, I. S. and Abayomi-Alli, O. O.(2025) An Enterprise Cloud-Based Electronic Health Records System, Journal of Computer Science and Information Technology, 2(2), 21-36.
Butun Ismail(2023)., “Prevention and Detection of Intrusions in Wireless Sensor Networks”, Scholar Commons: 15
Diogenes, Y. and Ozkaya,E. (2023) Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, in Cybersecurity – Attack and Defense Strategies, 2nd Editio., Packt Publishing Ltd., 2-30
Hosna, A., Merry, E., Gyalmo, J., Alom, Z., Aung, Z. and Azim, M. A.(2022), Transfer learning: a friendly introduction, Hosna et al. Journal of Big Data, 1-19
Kim, D. H., & MacKinnon, T. (2018). Artificial intelligence in fracture detection: transfer learning from deep convolutional neural networks. Clinical radiology, 73(5), 439-445
Neog, et al (2020). , Data Mining Techniques for (Network) Intrusion Detection Systems: 1
Solanki, S., Gupta, C. and Rai, K.(2023), A Survey on Machine Learning based Intrusion Detection System on NSLKDD Dataset, International Journal of Computer Applications, 176(20), 121- 128.
Stosic L. (2022), “Computer Security and security technmologies”, Research Gate: 25.
Surantha N. and Wicaksono W. (2020), An IoT based House Intruder Detection and Alert System using Histogram of Oriented Gradients”, Journal of Computer Science, 31(41), 1101-1121
Tan, Z. Jamdagni, X. He, X. Nanda, P. and Liu, R. P. (2024), A system for denial-of-service attack detection based on multivariate correlation analysis, IEEE Transactions on Parallel and Distributed Systems, 25, 447–456.
Tsiakmaki, M., Kostopoulos, G., Kotsiantis, S., & Ragos, O. (2020). Transfer learning from deep neural networks for predicting student performance. Applied Sciences, 10(6), 2145.
Vadhil, F. A., Salihi, M. L. and Nanne, M. F.(2024), Machine learning-based intrusion detection system for detecting web attacks, IAES International Journal of Artificial Intelligence (IJ-AI), 13(1), 711~721
Usha D. And Suganthi S. (2023), A Survey of Intrusion Detection System in IoT Devices,
International Journal of Advanced Research (IJAR): 23, 12-23.
Wang K. and Stolfo S., (2023), “Anomalous Payload-based Network Intrusion Detection”:12-23
DOI: http://dx.doi.org/10.52155/ijpsat.v56.2.7974
Refbacks
- There are currently no refbacks.
Copyright (c) 2026 Umejuru Daniel, Vivian Onyinyechi Anthony

This work is licensed under a Creative Commons Attribution 4.0 International License.


















