Nearest cluster-based intrusion detection through convolutional neural networks
暂无分享,去创建一个
Donato Malerba | Annalisa Appice | Giuseppina Andresini | D. Malerba | A. Appice | Giuseppina Andresini
[1] Dong Jin,et al. A Comparative Study of Off-Line Deep Learning Based Network Intrusion Detection , 2018, 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN).
[2] Yoshua Bengio,et al. Deep Sparse Rectifier Neural Networks , 2011, AISTATS.
[3] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] David D. Cox,et al. Making a Science of Model Search: Hyperparameter Optimization in Hundreds of Dimensions for Vision Architectures , 2013, ICML.
[5] Prabaharan Poornachandran,et al. Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[6] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[7] Xu Chen,et al. Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data , 2019, IEEE Access.
[8] Nour Moustafa,et al. Identification of malicious activities in industrial internet of things based on deep learning models , 2018, J. Inf. Secur. Appl..
[9] Djamal Zeghlache,et al. A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[10] Lei Shi,et al. MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks , 2019, ICANN.
[11] Victor C. M. Leung,et al. Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data , 2018, IEEE Access.
[12] K. V. N. Sunitha,et al. Effective discriminant function for intrusion detection using SVM , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[13] Ahmed Elsherif,et al. Automatic Intrusion Detection System Using Deep Recurrent Neural Network Paradigm , 2018 .
[14] Yixian Yang,et al. Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks , 2019, Applied Sciences.
[15] Xue Wang,et al. Comparison deep learning method to traditional methods using for network intrusion detection , 2016, 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN).
[16] Ethem Alpaydin,et al. Unsupervised feature extraction with autoencoder trees , 2017, Neurocomputing.
[17] K. P. Soman,et al. Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.
[18] Tao Feng,et al. Statistics-Enhanced Direct Batch Growth Self-Organizing Mapping for Efficient DoS Attack Detection , 2019, IEEE Access.
[19] Kai Huang,et al. Intrusion Detection Using Convolutional Neural Networks for Representation Learning , 2017, ICONIP.
[20] Yu-Lin He,et al. Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..
[21] Chuan Sheng Foo,et al. Adversarially Learned Anomaly Detection , 2018, 2018 IEEE International Conference on Data Mining (ICDM).
[22] D. Sculley,et al. Web-scale k-means clustering , 2010, WWW '10.
[23] Cheng-Chew Lim,et al. Using Convolutional Neural Networks for Classifying Malicious Network Traffic , 2019, Deep Learning Applications for Cyber Security.
[24] Jinoh Kim,et al. An Encoding Technique for CNN-based Network Anomaly Detection , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[25] Muhammad Munwar Iqbal,et al. Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.
[26] Michael P. Cohen,et al. Stratified Sampling , 2022, The SAGE Encyclopedia of Research Design.
[27] Yunbin He. Identification and Processing of Network Abnormal Events Based on Network Intrusion Detection Algorithm , 2019, Int. J. Netw. Secur..
[28] Abdallah Moubayed,et al. Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[29] Pasquale Malacaria,et al. Malware Detection Using 1-Dimensional Convolutional Neural Networks , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[30] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[31] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[32] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[33] Adel Binbusayyis,et al. Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach , 2019, IEEE Access.
[34] Georg Langs,et al. Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.
[35] Jaime Lloret,et al. Shallow neural network with kernel approximation for prediction problems in highly demanding data networks , 2019, Expert Syst. Appl..
[36] Corrado Loglisci,et al. Exploiting the Auto-Encoder Residual Error for Intrusion Detection , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[37] Tayeb Kenaza,et al. An efficient hybrid SVDD/clustering approach for anomaly-based intrusion detection , 2018, SAC.
[38] Donato Malerba,et al. Dealing with Class Imbalance in Android Malware Detection by Cascading Clustering and Classification , 2020, Complex Pattern Mining.
[39] Thomas Brox,et al. Striving for Simplicity: The All Convolutional Net , 2014, ICLR.
[40] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[41] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[42] Daniel S. Berman,et al. A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..
[43] Ahmed Ahmim,et al. A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models , 2018, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).
[44] André C. Drummond,et al. Adaptive anomaly‐based intrusion detection system using genetic algorithm and profiling , 2018, Secur. Priv..
[45] Karel Macek,et al. Pareto Principle in Datamining: an Above-Average Fencing Algorithm , 2008 .
[46] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[47] Abderrahim Benslimane,et al. Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN , 2018, 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM).
[48] Jinoh Kim,et al. An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[49] Sven Behnke,et al. Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition , 2010, ICANN.
[50] Kaushik Roy,et al. LSTM for Anomaly-Based Network Intrusion Detection , 2018, 2018 28th International Telecommunication Networks and Applications Conference (ITNAC).
[51] Jacek Rumiński,et al. A survey of neural networks usage for intrusion detection systems , 2020, Journal of Ambient Intelligence and Humanized Computing.
[52] Julio Ortega Lopera,et al. PCA filtering and probabilistic SOM for network intrusion detection , 2015, Neurocomputing.
[53] Jian Sun,et al. Convolutional neural networks at constrained time cost , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).