Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Significant summary of literature.

More »

Table 1 Expand

Fig 1.

Wi-Fi intrusion detection system.

More »

Fig 1 Expand

Fig 2.

Proposed methodology.

More »

Fig 2 Expand

Algorithm 1.

DT Algorithm.

More »

Algorithm 1 Expand

Algorithm 2.

Convolutional Neural Network (CNN).

More »

Algorithm 2 Expand

Fig 3.

Classes distribution.

More »

Fig 3 Expand

Table 2.

Selected features.

More »

Table 2 Expand

Table 3.

Parameters of tree-based classifiers.

More »

Table 3 Expand

Table 4.

DNN architectures.

More »

Table 4 Expand

Table 5.

DT-RFE features.

More »

Table 5 Expand

Fig 4.

Performance evaluation.

More »

Fig 4 Expand

Fig 5.

MLP.

More »

Fig 5 Expand

Fig 6.

CNN.

More »

Fig 6 Expand

Fig 7.

Decision tree.

More »

Fig 7 Expand

Fig 8.

Random forest.

More »

Fig 8 Expand

Fig 9.

Extra trees.

More »

Fig 9 Expand

Fig 10.

Light GBM.

More »

Fig 10 Expand

Fig 11.

MLP.

More »

Fig 11 Expand

Fig 12.

CNN.

More »

Fig 12 Expand

Fig 13.

Average number of misclassified instances.

More »

Fig 13 Expand

Fig 14.

Feature transferability evaluation.

More »

Fig 14 Expand

Fig 15.

Transferability with DT.

More »

Fig 15 Expand

Fig 16.

Transferability with CNN.

More »

Fig 16 Expand

Table 6.

Features for each attack.

More »

Table 6 Expand

Table 7.

Performance metrics for feature reduction of each attack.

More »

Table 7 Expand

Fig 17.

Random forest.

More »

Fig 17 Expand

Fig 18.

Extra trees.

More »

Fig 18 Expand

Fig 19.

Decision trees.

More »

Fig 19 Expand

Fig 20.

Random forest.

More »

Fig 20 Expand

Fig 21.

Extra trees.

More »

Fig 21 Expand

Fig 22.

Random forest.

More »

Fig 22 Expand

Fig 23.

Extra trees.

More »

Fig 23 Expand

Fig 24.

Random forest.

More »

Fig 24 Expand

Fig 25.

Extra trees.

More »

Fig 25 Expand

Table 8.

Feature generalization using AWID dataset.

More »

Table 8 Expand

Table 9.

Comparison with state-of-the-art techniques.

More »

Table 9 Expand

Table 10.

Transferability—state-of-the-art performance.

More »

Table 10 Expand