An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN
暂无分享,去创建一个
Mahesh Chandra Govil | Emmanuel S. Pilli | Pankaj Kumar Keserwani | M. C. Govil | Prajjval Govil | E. Pilli | Prajjval Govil
[1] Benjamin Turnbull,et al. Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers , 2019, IEEE Access.
[2] Jie Gu,et al. A novel approach to intrusion detection using SVM ensemble with feature augmentation , 2019, Comput. Secur..
[3] MengChu Zhou,et al. An Efficient Cooperative Medium Access Control Protocol for Wireless IoT networks in Smart World System , 2019, J. Netw. Comput. Appl..
[4] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[5] Jiadong Ren,et al. A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection , 2019, IEEE Access.
[6] Manu Vardhan,et al. Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection , 2019, Evolutionary Intelligence.
[7] Bayu Adhi Tama,et al. TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System , 2019, IEEE Access.
[8] Victor Valeriu Patriciu,et al. Intrusions detection based on Support Vector Machine optimized with swarm intelligence , 2014, 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI).
[9] A. A. Zaidan,et al. Novel meta-heuristic bald eagle search optimisation algorithm , 2019, Artificial Intelligence Review.
[10] Zulaiha Ali Othman,et al. Bees algorithm for feature selection in network anomaly detection , 2012 .
[11] Arafat Awajan,et al. Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System , 2017, 2017 International Conference on New Trends in Computing Sciences (ICTCS).
[12] Ditipriya Sinha,et al. An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset , 2019, Cluster Computing.
[13] 赵津,et al. 云环境下基于SOM神经网络的入侵检测方法研究 Research on Intrusion Detection Method Based on SOM Neural Network in Cloud Environment , 2016 .
[14] Khan Muhammad,et al. Five-category classification of pathological brain images based on deep stacked sparse autoencoder , 2017, Multimedia Tools and Applications.
[15] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[16] Gholamhossein Dastghaibyfard,et al. Two-tier network anomaly detection model: a machine learning approach , 2017, Journal of Intelligent Information Systems.
[17] Giancarlo Fortino,et al. Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs , 2019, Inf. Sci..
[18] H. S. Hota,et al. Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS) , 2013, ICACNI.
[19] Hossam Faris,et al. Grey wolf optimizer: a review of recent variants and applications , 2017, Neural Computing and Applications.
[20] Ahmad Faraahi,et al. An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks , 2011 .
[21] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[22] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[23] Partha Ghosh,et al. CS-PSO based Intrusion Detection System in Cloud Environment , 2018, Advances in Intelligent Systems and Computing.
[24] Irfan Gul,et al. Distributed Cloud Intrusion Detection Model , 2011 .
[25] Mohammed Anbar,et al. Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm , 2019, Journal of Ambient Intelligence and Humanized Computing.
[26] Shalini Batra,et al. Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection , 2017, Comput. Electr. Eng..
[27] Chirag Modi,et al. Designing an efficient security framework for detecting intrusions in virtual network of cloud computing , 2019, Comput. Secur..
[28] Xue Wang,et al. Comparison deep learning method to traditional methods using for network intrusion detection , 2016, 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN).
[29] Ashraf Darwish,et al. Intelligent Hybrid Anomaly Network Intrusion Detection System , 2011, FGIT-FGCN.
[30] Jason J. Jung,et al. HIDCC: A hybrid intrusion detection approach in cloud computing , 2018, Concurr. Comput. Pract. Exp..
[31] S. P. Shantharajah,et al. A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms , 2015 .
[32] Chase Qishi Wu,et al. An Effective Deep Learning Based Scheme for Network Intrusion Detection , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).
[33] Shailesh Singh Panwar,et al. Performance Analysis of NSL-KDD Dataset Using Classification Algorithms with Different Feature Selection Algorithms and Supervised Filter Discretization , 2020 .
[34] Ramchandra S. Mangrulkar,et al. Intrusion Detection System Using Random Forest on the NSL-KDD Dataset , 2019, Emerging Research in Computing, Information, Communication and Applications.
[35] Georgia Sakellari,et al. Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.