A Step Forward to Revolutionize Intrusion Detection System Using Deep Convolutional Neural Network
暂无分享,去创建一个
[1] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[2] Sheng Wang,et al. BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset , 2020, IEEE Access.
[3] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[4] Fahimeh Farahnakian,et al. A deep auto-encoder based approach for intrusion detection system , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[5] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[6] Swati Paliwal,et al. Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm , 2012 .
[7] Anamika Yadav,et al. Performance analysis of NSL-KDD dataset using ANN , 2015, 2015 International Conference on Signal Processing and Communication Engineering Systems.
[8] Robert K. Cunningham,et al. Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.
[9] Ingrid Russell,et al. An introduction to the WEKA data mining system , 2006, ITICSE '06.
[10] Jérôme Darmont,et al. Adaptive Network Intrusion Detection Learning: Attribute Selection and Classification , 2009 .
[11] Tanupriya Choudhury,et al. Comparison between significance of usability and security in HCI , 2017, 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT).
[12] Kai Huang,et al. Intrusion Detection Using Convolutional Neural Networks for Representation Learning , 2017, ICONIP.
[13] Flora Amato,et al. Using Multilayer Perceptron in Computer Security to Improve Intrusion Detection , 2018, IIMSS.
[14] Ming Zhu,et al. Malware traffic classification using convolutional neural network for representation learning , 2017, 2017 International Conference on Information Networking (ICOIN).
[15] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[16] Victor Valeriu Patriciu,et al. Intrusions detection based on Support Vector Machine optimized with swarm intelligence , 2014, 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI).
[17] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[18] M. A. Jabbar,et al. Random Forest Modeling for Network Intrusion Detection System , 2016 .
[19] Yiqiang Sheng,et al. HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection , 2018, IEEE Access.
[20] Paul D. Yoo,et al. From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods , 2018, IEEE Communications Surveys & Tutorials.
[21] Ravi Tomar,et al. Establishing Parameters for Comparative Analysis of V2V Communication in VANET , 2020, Journal of Scientific & Industrial Research.