Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks
暂无分享,去创建一个
[1] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[2] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[3] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..
[4] Mitko Bogdanoski,et al. Analysis of the SYN Flood DoS Attack , 2013 .
[5] Kim-Kwang Raymond Choo,et al. On cloud security attacks: A taxonomy and intrusion detection and prevention as a service , 2016, J. Netw. Comput. Appl..
[6] Shouhuai Xu,et al. Spatiotemporal Patterns and Predictability of Cyberattacks , 2015, PloS one.
[7] Ryan Shea,et al. Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis , 2013, IEEE Systems Journal.
[8] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[9] Y. V. Ramana Reddy,et al. TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation , 2005, Adv. Eng. Informatics.
[10] Abdul Razaque,et al. Deep recurrent neural network for IoT intrusion detection system , 2020, Simul. Model. Pract. Theory.
[11] Xiangji Huang,et al. Mining network data for intrusion detection through combining SVMs with ant colony networks , 2014, Future Gener. Comput. Syst..
[12] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[13] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[14] Sonia Fahmy,et al. Accurately Measuring Denial of Service in Simulation and Testbed Experiments , 2009, IEEE Transactions on Dependable and Secure Computing.
[15] Jiyeon Kim,et al. An Intrusion Detection Model based on a Convolutional Neural Network , 2019, J. Multim. Inf. Syst..
[16] Leyla Bilge,et al. Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains , 2014, TSEC.
[17] Siyang Zhang,et al. A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..