Toward a deep learning-based intrusion detection system for IoT against botnet attacks
暂无分享,去创建一个
Mostafa Azizi | Hakim El Fadili | Omar Moussaoui | Idriss Idrissi | Mohammed Boukabous | M. Azizi | H. E. Fadili | Idriss Idrissi | Mohammed Boukabous | O. Moussaoui
[1] P. Gaur. Neural networks in data mining , 2018 .
[2] M. Omair Shafiq,et al. Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[3] Kwangjo Kim,et al. Deep Learning in Intrusion Detection System: An Overview , 2016 .
[4] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[5] Antonio Robles-Kelly,et al. Deep Learning-Based Intrusion Detection for IoT Networks , 2019, 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC).
[6] B. Muthukumar,et al. Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach , 2015 .
[7] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[8] Benjamin Turnbull,et al. Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers , 2019, IEEE Access.
[9] Mimoun Moussaoui,et al. Detection of smart card attacks using neural networks , 2012, 2012 International Conference on Multimedia Computing and Systems.
[10] Cheng Xing,et al. An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks , 2019, IEEE Access.
[11] Biswajeet Pradhan,et al. Severity Prediction of Traffic Accidents with Recurrent Neural Networks , 2017 .
[12] Yoshua Bengio,et al. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.
[13] Farrukh Aslam Khan,et al. Network intrusion detection using hybrid binary PSO and random forests algorithm , 2015, Secur. Commun. Networks.
[14] David M. Eyers,et al. Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.
[15] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[16] A. Mechelli,et al. Using deep learning to investigate the neuroimaging correlates of psychiatric and neurological disorders: Methods and applications , 2017, Neuroscience & Biobehavioral Reviews.
[17] Mostafa Azizi,et al. Artificial neural network-based methodology for vulnerabilities detection in EMV cards , 2015, 2015 11th International Conference on Information Assurance and Security (IAS).
[18] Wojciech Zaremba,et al. An Empirical Exploration of Recurrent Network Architectures , 2015, ICML.
[19] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[20] Mohamed Amine Ferrag,et al. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study , 2020, J. Inf. Secur. Appl..
[21] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[22] Xiaojiang Du,et al. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.
[23] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[24] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[25] Wenwei Tao,et al. A Network Intrusion Detection Model Based on Convolutional Neural Network , 2018, Security with Intelligent Computing and Big-data Services.