Network anomaly detection with the restricted Boltzmann machine
暂无分享,去创建一个
Alfredo De Santis | Francesco Palmieri | Ugo Fiore | Aniello Castiglione | A. D. Santis | Aniello Castiglione | F. Palmieri | Ugo Fiore
[1] Francesco Palmieri,et al. A botnet-based command and control approach relying on swarm intelligence , 2014, J. Netw. Comput. Appl..
[2] Chung-Ming Ou,et al. Host-based intrusion detection systems adapted from agent-based artificial immune systems , 2012, Neurocomputing.
[3] Alfredo De Santis,et al. Device Tracking in Private Networks via NAPT Log Analysis , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[4] Marek R. Ogiela,et al. Advances in Cognitive Information Systems , 2012, Cognitive Systems Monographs.
[5] Ali A. Ghorbani,et al. Improved competitive learning neural networks for network intrusion and fraud detection , 2012, Neurocomputing.
[6] Geoffrey E. Hinton. A Practical Guide to Training Restricted Boltzmann Machines , 2012, Neural Networks: Tricks of the Trade.
[7] Carla E. Brodley,et al. FRaC: a feature-modeling approach for semi-supervised and unsupervised anomaly detection , 2012, Data Mining and Knowledge Discovery.
[8] Jong-Suk Ruth Lee,et al. Self-Similar Properties of Spam , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[9] Massimo Ficco,et al. A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing , 2011, 2011 First International Conference on Data Compression, Communications and Processing.
[10] Heba F. Eid,et al. Hybrid Intelligent Intrusion Detection Scheme , 2011 .
[11] Francesco Palmieri,et al. Network anomaly detection through nonlinear analysis , 2010, Comput. Secur..
[12] Yoshua Bengio,et al. Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.
[13] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[14] Francesco Palmieri,et al. A nonlinear, recurrence-based approach to traffic classification , 2009, Comput. Networks.
[15] Tsuhan Chen,et al. Semi-supervised co-training and active learning based approach for multi-view intrusion detection , 2009, SAC '09.
[16] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[17] Yingjie Tian,et al. Semi-supervised learning methods for network intrusion detection , 2008, 2008 IEEE International Conference on Systems, Man and Cybernetics.
[18] Yoshua Bengio,et al. Classification using discriminative restricted Boltzmann machines , 2008, ICML '08.
[19] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[20] Francesco Palmieri,et al. Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system , 2007, Int. J. Wirel. Mob. Comput..
[21] Boris N. Oreshkin,et al. Machine learning approaches to network anomaly detection , 2007 .
[22] Yoshua. Bengio,et al. Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..
[23] Geoffrey E. Hinton,et al. To recognize shapes, first learn to generate images. , 2007, Progress in brain research.
[24] Richard Baraniuk,et al. Learning Minimum Volume Sets with Support Vector Machines , 2006, 2006 16th IEEE Signal Processing Society Workshop on Machine Learning for Signal Processing.
[25] Christopher M. Bishop,et al. Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .
[26] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[27] J. Chow. An Assessment of the DARPA IDS Evaluation Dataset Using Snort S Terry Brugger , 2005 .
[28] C. Janeway. Immunobiology: The Immune System in Health and Disease , 1996 .
[29] T.Y. Lin,et al. Anomaly detection , 1994, Proceedings New Security Paradigms Workshop.
[30] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.