A Hybrid Methodologies for Intrusion Detection Based Deep Neural Network with Support Vector Machine and Clustering Technique
暂无分享,去创建一个
Yang Yu | Tao Ma | Qiang Zhang | Xiaoyun Chen | Fen Wang | Xiaoyun Chen | Tao Ma | Qiang Zhang | Yang Yu | Fen Wang
[1] Sheng-Hsun Hsu,et al. Application of SVM and ANN for intrusion detection , 2005, Comput. Oper. Res..
[2] Shahram Sarkani,et al. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..
[3] Gerald A. Marin. Network Security Basics , 2005, IEEE Secur. Priv..
[4] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[5] Rasmus Berg Palm,et al. Prediction as a candidate for learning deep hierarchical models of data , 2012 .
[6] Larry P. Heck,et al. Learning deep structured semantic models for web search using clickthrough data , 2013, CIKM.
[7] Malcolm I. Heywood,et al. A Hierarchical SOM based Intrusion Detection System , 2008 .
[8] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[9] Trishul M. Chilimbi,et al. Project Adam: Building an Efficient and Scalable Deep Learning Training System , 2014, OSDI.
[10] Eric Horvitz,et al. A Deep Hybrid Model for Weather Forecasting , 2015, KDD.
[11] Manel Guerrero Zapata,et al. A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks , 2015, Neurocomputing.
[12] Md Zahangir Alom,et al. Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).
[13] Yoshua Bengio,et al. Why Does Unsupervised Pre-training Help Deep Learning? , 2010, AISTATS.
[14] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[15] Yoshua Bengio,et al. Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.
[16] Mamun Bin Ibne Reaz,et al. A novel SVM-kNN-PSO ensemble method for intrusion detection system , 2016, Appl. Soft Comput..
[17] Mohak Shah,et al. Evaluating Learning Algorithms: A Classification Perspective , 2011 .
[18] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[19] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[20] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[21] Heba F. Eid,et al. Hybrid Intelligent Intrusion Detection Scheme , 2011 .
[22] Jaideep Srivastava,et al. Data Mining for Network Intrusion Detection , 2002 .