Features Quality Impact on Cyber Physical Security Systems
暂无分享,去创建一个
[1] Yuval Elovici,et al. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.
[2] Monther Aldwairi,et al. Anomaly Payload Signature Generation System Based on Efficient Tokenization Methodology , 2018 .
[3] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[4] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[5] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[6] Durga Prasad Mohapatra,et al. An SVM-Based Ensemble Approach for Intrusion Detection , 2019, Int. J. Inf. Technol. Web Eng..
[7] Asaf Shabtai,et al. MDGAN: Boosting Anomaly Detection Using Multi-Discriminator Generative Adversarial Networks , 2018, ArXiv.
[8] Yuval Elovici,et al. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection , 2018, NDSS.
[9] Marcelo R. Campo,et al. Survey on network-based botnet detection methods , 2014, Secur. Commun. Networks.
[10] Bartley D. Richardson,et al. Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic , 2018, ArXiv.