An Intrusion Detection System Based on a Quantitative Model of Interaction Mode Between Ports
暂无分享,去创建一个
[1] Stella X. Yu,et al. CNN Feature Similarity: Paintings Are More Self-Similar at All Levels , 2018, 2018 Colour and Visual Computing Symposium (CVCS).
[2] F. Takens. Detecting strange attractors in turbulence , 1981 .
[3] Jürgen Schmidhuber,et al. LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[4] Farrukh Aslam Khan,et al. TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection , 2019, IEEE Access.
[5] Muhammad Munwar Iqbal,et al. Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.
[6] Bin Sun,et al. The Improved Model for Anomaly Detection Based on Clustering and Dividing of Flow , 2019, 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC).
[7] Floris Takens,et al. On the numerical determination of the dimension of an attractor , 1985 .
[8] Akira Kato,et al. Traffic Data Repository at the WIDE Project , 2000, USENIX Annual Technical Conference, FREENIX Track.
[9] Feng Jiang,et al. Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.
[10] K. P. Soman,et al. Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.
[11] Jacob Benesty,et al. Pearson Correlation Coefficient , 2009 .
[12] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[13] Dan Wang,et al. An Effective Feature Selection Approach for Network Intrusion Detection , 2013, 2013 IEEE Eighth International Conference on Networking, Architecture and Storage.
[14] P. Grassberger,et al. Measuring the Strangeness of Strange Attractors , 1983 .
[15] M. Clayton,et al. Confidence Intervals for Autocorrelations Based on Cyclic Samples , 1995 .
[16] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[17] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[18] Ming Zhu,et al. End-to-end encrypted traffic classification with one-dimensional convolution neural networks , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[19] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[20] Claudia Eckert,et al. Empowering convolutional networks for malware classification and analysis , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[21] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[22] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[23] Ming Zhu,et al. Malware traffic classification using convolutional neural network for representation learning , 2017, 2017 International Conference on Information Networking (ICOIN).
[24] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[25] Stephen D. Bay,et al. The UCI KDD archive of large data sets for data mining research and experimentation , 2000, SKDD.
[26] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[27] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[28] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[29] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[30] Fraser,et al. Independent coordinates for strange attractors from mutual information. , 1986, Physical review. A, General physics.