Unsupervised learning approach for network intrusion detection system using autoencoders
暂无分享,去创建一个
Wooju Kim | Hyunseung Choi | Mintae Kim | Gyubok Lee | Mintae Kim | Wooju Kim | Hyunseung Choi | Gyubok Lee
[1] Yuval Elovici,et al. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection , 2018, NDSS.
[2] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[3] Gary B. Wills,et al. Unsupervised Clustering Approach for Network Anomaly Detection , 2012, NDT.
[4] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[5] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[6] H. Robbins. A Stochastic Approximation Method , 1951 .
[7] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[8] Peter Mell,et al. Intrusion Detection Systems , 2001 .
[9] C. A. Kumar,et al. An analysis of supervised tree based classifiers for intrusion detection system , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.
[10] Hamid R. Arabnia,et al. A Methodology to Conceal QR Codes for Security Applications , 2011 .
[11] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[12] Peter Mell,et al. NIST Special Publication on Intrusion Detection Systems , 2001 .
[13] Ashraf Darwish,et al. Principle components analysis and Support Vector Machine based Intrusion Detection System , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.
[14] Hamid R. Arabnia,et al. Security surveillance applications utilizing parallel video-processing techniques in the spatial domain , 2015, CVPR 2015.
[15] Yoshua Bengio,et al. Extracting and composing robust features with denoising autoencoders , 2008, ICML '08.
[16] Takehisa Yairi,et al. Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction , 2014, MLSDA'14.
[17] Dhruba Kumar Bhattacharyya,et al. Anomaly Detection Analysis of Intrusion Data Using Supervised & Unsupervised Approach , 2010, J. Convergence Inf. Technol..
[18] Reyadh Shaker Naoum,et al. An Enhanced Resilient Backpropagation Artificial Neural Network for Intrusion Detection System , 2012 .
[19] B. Akhgar,et al. Application of Big Data for National Security: A Practitioner’s Guide to Emerging Technologies , 2015 .
[20] Yoshua Bengio,et al. Greedy Layer-Wise Training of Deep Networks , 2006, NIPS.
[21] Yoshua. Bengio,et al. Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..
[22] Fuchun Sun,et al. Building feature space of extreme learning machine with sparse denoising stacked-autoencoder , 2016, Neurocomputing.
[23] Manas Ranjan Patra,et al. Discriminative multinomial Naïve Bayes for network intrusion detection , 2010, 2010 Sixth International Conference on Information Assurance and Security.