A Step Forward to Revolutionise IntrusionDetection System Using Deep Convolution Neural Network
暂无分享,去创建一个
Samir Kumar Bandyopadhyay | Ratul Chowdhury | Banani Saha | Arindam Roy | Banani Saha | S. Bandyopadhyay | Ratul Chowdhury | Arindam Roy
[1] Daniel S. Berman,et al. A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..
[2] Paul D. Yoo,et al. From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods , 2018, IEEE Communications Surveys & Tutorials.
[3] Fahimeh Farahnakian,et al. A deep auto-encoder based approach for intrusion detection system , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[4] Yiqiang Sheng,et al. HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection , 2018, IEEE Access.
[5] Flora Amato,et al. Using Multilayer Perceptron in Computer Security to Improve Intrusion Detection , 2018, IIMSS.
[6] Kai Huang,et al. Intrusion Detection Using Convolutional Neural Networks for Representation Learning , 2017, ICONIP.
[7] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[8] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[9] Di Wu,et al. Recent advances in video-based human action recognition using deep learning: A review , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[10] Ming Zhu,et al. Malware traffic classification using convolutional neural network for representation learning , 2017, 2017 International Conference on Information Networking (ICOIN).
[11] Mamun Bin Ibne Reaz,et al. Survey of learning methods in intrusion detection systems , 2016, 2016 International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES).
[12] M. A. Jabbar,et al. Random Forest Modeling for Network Intrusion Detection System , 2016 .
[13] Anamika Yadav,et al. Performance analysis of NSL-KDD dataset using ANN , 2015, 2015 International Conference on Signal Processing and Communication Engineering Systems.
[14] S. P. Shantharajah,et al. A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms , 2015 .
[15] Victor Valeriu Patriciu,et al. Intrusions detection based on Support Vector Machine optimized with swarm intelligence , 2014, 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI).
[16] Colleen Richey,et al. Emotion detection in speech using deep networks , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[17] A. Malathi,et al. A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection , 2013 .
[18] Namita Parati,et al. Intrusion Detection System Using Support Vector Machine , 2013 .
[19] Swati Paliwal,et al. Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm , 2012 .
[20] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[21] Jérôme Darmont,et al. Adaptive Network Intrusion Detection Learning: Attribute Selection and Classification , 2009 .
[22] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[23] Ingrid Russell,et al. An introduction to the WEKA data mining system , 2006, ITICSE '06.
[24] Wenbin Zheng,et al. Intrusion prevention system design , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[25] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[26] Robert K. Cunningham,et al. Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.
[27] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .