An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model
暂无分享,去创建一个
Albert Y. Zomaya | Kuan-Ching Li | Wei Liang | Xiaoyan Kui | Jing Long | Kuan-Ching Li | Jing Long | W. Liang | Xiaoyan Kui
[1] Muhammad Munwar Iqbal,et al. Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.
[2] Mingdong Tang,et al. A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things , 2019, IEEE Transactions on Industrial Informatics.
[3] Victor O. K. Li,et al. Online False Data Injection Attack Detection With Wavelet Transform and Deep Neural Networks , 2018, IEEE Transactions on Industrial Informatics.
[4] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[5] Jianxin Wang,et al. On Threshold-Free Error Detection for Industrial Wireless Sensor Networks , 2018, IEEE Transactions on Industrial Informatics.
[6] Robert K. Cunningham,et al. Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.
[7] Feng Jiang,et al. Point-to-Set Distance Metric Learning on Deep Representations for Visual Tracking , 2018, IEEE Transactions on Intelligent Transportation Systems.
[8] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[9] John Bigham,et al. Test data for anomaly detection in the electricity infrastructure , 2006, Int. J. Crit. Infrastructures.
[10] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[11] Scott Ruoti,et al. Intrusion Detection with Unsupervised Heterogeneous Ensembles Using Cluster-Based Normalization , 2017, 2017 IEEE International Conference on Web Services (ICWS).
[12] Keqin Li,et al. A double PUF-based RFID identity authentication protocol in service-centric internet of things environments , 2019, Inf. Sci..
[13] Jianxin Wu,et al. Good Practices for Learning to Recognize Actions Using FV and VLAD , 2016, IEEE Transactions on Cybernetics.
[14] Feng Jiang,et al. Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.
[15] Ali Dehghantanha,et al. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[16] Xiaofeng Wang,et al. A cloud-based experimental platform for networked industrial control systems , 2018, Int. J. Model. Simul. Sci. Comput..
[17] Fuchun Sun,et al. Efficient and Rapid Machine Learning Algorithms for Big Data and Dynamic Varying Systems , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[18] Zhu Han,et al. Machine Learning Paradigms for Next-Generation Wireless Networks , 2017, IEEE Wireless Communications.
[19] Harish Kumar,et al. An intrusion detection system using network traffic profiling and online sequential extreme learning machine , 2015, Expert Syst. Appl..
[20] Yuting Su,et al. Multiple/Single-View Human Action Recognition via Part-Induced Multitask Structural Learning , 2015, IEEE Transactions on Cybernetics.
[21] Peng Jiang,et al. An Intelligent Outlier Detection Method With One Class Support Tucker Machine and Genetic Algorithm Toward Big Sensor Data in Internet of Things , 2019, IEEE Transactions on Industrial Electronics.
[22] Manisha Patil,et al. A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .
[23] Elisa Bertino,et al. Internet of Things (IoT) , 2016, ACM Trans. Internet Techn..