A Survey on Data-driven Network Intrusion Detection
暂无分享,去创建一个
[1] Yang-Wai Chow,et al. Interactive three-dimensional visualization of network intrusion detection data for machine learning , 2020, Future Gener. Comput. Syst..
[2] Jie Li,et al. DeepDDoS: Online DDoS Attack Detection , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[3] M. A. Jabbar,et al. Random Forest Modeling for Network Intrusion Detection System , 2016 .
[4] Kian Hsiang Low,et al. GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).
[5] Elisa Bertino,et al. Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning , 2019, 2019 IEEE International Conference on Smart Computing (SMARTCOMP).
[6] Ing-Ray Chen,et al. A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..
[7] Yang Xin,et al. Robust detection for network intrusion of industrial IoT based on multi-CNN fusion , 2020 .
[8] Douglas A. Talbert,et al. Ensemble-Based Online Machine Learning Algorithms for Network Intrusion Detection Systems Using Streaming Data , 2020, Inf..
[9] Haibo He,et al. A local density-based approach for outlier detection , 2017, Neurocomputing.
[10] Eui-Jik Kim,et al. An Authorized Access Attack Detection Method for Realtime Intrusion Detection System , 2020, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).
[11] Peng Hao,et al. Transfer learning using computational intelligence: A survey , 2015, Knowl. Based Syst..
[12] Yu Jie,et al. Research on Intrusion Detection Method Based on SVM Co-training , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.
[13] Wooseong Kim,et al. 1D CNN based network intrusion detection with normalization on imbalanced data , 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
[14] Kensuke Fukuda,et al. A taxonomy of anomalies in backbone network traffic , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[15] David Aspinall,et al. Traffic Generation using Containerization for Machine Learning , 2019, 2019 Workshop on DYnamic and Novel Advances in Machine learning and Intelligent Cyber Security.
[16] Jiankun Hu,et al. Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling , 2017, J. Netw. Comput. Appl..
[17] Beizhan Wang,et al. Feature selection based on Rough set and modified genetic algorithm for intrusion detection , 2010, 2010 5th International Conference on Computer Science & Education.
[18] Martin Sarnovsky,et al. Hierarchical Intrusion Detection Using Machine Learning and Knowledge Model , 2020, Symmetry.
[19] Khaled Ragab,et al. Genetic fuzzy system for intrusion detection: Analysis of improving of multiclass classification accuracy using KDDCup-99 imbalance dataset , 2012, 2012 12th International Conference on Hybrid Intelligent Systems (HIS).
[20] Christos Faloutsos,et al. Suspicious Behavior Detection: Current Trends and Future Directions , 2016, IEEE Intelligent Systems.
[21] Nima Jafari Navimipour,et al. Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm , 2019, ICT Express.
[22] Philippe Owezarski,et al. Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge , 2012, Comput. Commun..
[23] Chia-Mei Chen,et al. An efficient network intrusion detection , 2010, Comput. Commun..
[24] Nguyen Xuan Hoai,et al. Malware detection using genetic programming , 2014, the 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).
[25] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[26] Ying Zhong,et al. HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning , 2020, Comput. Networks.
[27] Giancarlo Fortino,et al. Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs , 2019, Inf. Sci..
[28] Christos Faloutsos,et al. CatchTartan: Representing and Summarizing Dynamic Multicontextual Behaviors , 2016, KDD.
[29] H. E. Poston,et al. A brief taxonomy of intrusion detection strategies , 2012, 2012 IEEE National Aerospace and Electronics Conference (NAECON).
[30] Salah El Hadaj,et al. Performance evaluation of intrusion detection based on machine learning using Apache Spark , 2018 .
[31] Rua-Huan Tsaih,et al. Network-traffic anomaly detection with incremental majority learning , 2015, 2015 International Joint Conference on Neural Networks (IJCNN).
[32] Zhen Liu,et al. An Adaptive Ensemble Machine Learning Model for Intrusion Detection , 2019, IEEE Access.
[33] Adriel Cheng,et al. PAC-GAN: Packet Generation of Network Traffic using Generative Adversarial Networks , 2019, 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[34] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[35] Hongyu Yang,et al. Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network , 2019, IEEE Access.
[36] Bin Wu,et al. Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization , 2020, IEEE Access.
[37] Jaouhar Fattahi,et al. Fusion of ANN and SVM classifiers for network attack detection , 2017, 2017 18th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA).
[38] Marius Kloft,et al. Active learning for network intrusion detection , 2009, AISec '09.
[39] Chaouki Khammassi,et al. A GA-LR wrapper approach for feature selection in network intrusion detection , 2017, Comput. Secur..
[40] Wei Hu,et al. AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[41] Christos Faloutsos,et al. Catching Synchronized Behaviors in Large Networks , 2016, ACM Trans. Knowl. Discov. Data.
[42] Sachin Shetty,et al. Transfer learning for detecting unknown network attacks , 2019, EURASIP Journal on Information Security.
[43] Mohamed Baza,et al. Mimic Learning to Generate a Shareable Network Intrusion Detection Model , 2019, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).
[44] Xu Chen,et al. Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data , 2019, IEEE Access.
[45] Wing-Kwong Wong,et al. Reinforcement Learning of Robotic Motion with Genetic Programming, Simulated Annealing and Self-Organizing Map , 2011, 2011 International Conference on Technologies and Applications of Artificial Intelligence.
[46] Mei Song,et al. PCCN: Parallel Cross Convolutional Neural Network for Abnormal Network Traffic Flows Detection in Multi-Class Imbalanced Network Traffic Flows , 2019, IEEE Access.
[47] Dong Hyun Jeong,et al. A survey of cloud-based network intrusion detection analysis , 2016, Human-centric Computing and Information Sciences.
[48] Tianwen Jiang,et al. Error-Bounded Graph Anomaly Loss for GNNs , 2020, CIKM.
[49] Govind P. Gupta,et al. A Framework for Fast and Efficient Cyber Security Network Intrusion Detection Using Apache Spark , 2016 .
[50] Jinyin Chen,et al. DAD-MCNN: DDoS Attack Detection via Multi-channel CNN , 2019, ICMLC '19.
[51] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[52] Katherine Davis,et al. Data Processing and Model Selection for Machine Learning-based Network Intrusion Detection , 2020, 2020 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).
[53] Quanmin Wang,et al. The Detection of Network Intrusion Based on Improved Adaboost Algorithm , 2020, ICCSP.
[54] Sachin Shetty,et al. Feature-based transfer learning for network security , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[55] Neelam Sharma,et al. INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .
[56] Xiangji Huang,et al. Mining network data for intrusion detection through combining SVMs with ant colony networks , 2014, Future Gener. Comput. Syst..
[57] Joseph W. Mikhail,et al. A Semi-Boosted Nested Model With Sensitivity-Based Weighted Binarization for Multi-Domain Network Intrusion Detection , 2019, ACM Trans. Intell. Syst. Technol..
[58] Manas Ranjan Patra,et al. NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .
[59] Jinshu Su,et al. Evaluating Deep Learning Based Network Intrusion Detection System in Adversarial Environment , 2019, 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC).
[60] Dattaraj Rao,et al. Explaining Network Intrusion Detection System Using Explainable AI Framework , 2021, ArXiv.
[61] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[62] Xiangliang Zhang,et al. Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks , 2014, Knowl. Based Syst..
[63] Lian Hong,et al. Researches on the IPv6 Network safeguard linked system , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[64] Salvatore J. Stolfo,et al. Casting out Demons: Sanitizing Training Data for Anomaly Sensors , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[65] Pang-Ning Tan,et al. Detecting bots via incremental LS-SVM learning with dynamic feature adaptation , 2011, KDD.
[66] Fakhroddin Noorbehbahani,et al. An incremental intrusion detection system using a new semi‐supervised stream classification method , 2017, Int. J. Commun. Syst..
[67] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[68] David Fernández,et al. Enabling an Anatomic View to Investigate Honeypot Systems: A Survey , 2017, IEEE Systems Journal.
[69] Zahid Akhtar,et al. KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research , 2019, Computer.
[70] Gurdip Kaur,et al. Intrusion detection system using honeypots and swarm intelligence , 2011, ACAI '11.
[71] Adel Sabry Eesa,et al. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..
[72] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[73] Michał Choraś,et al. Achieving Explainability of Intrusion Detection System by Hybrid Oracle-Explainer Approach , 2020, 2020 International Joint Conference on Neural Networks (IJCNN).
[74] Wenhao Zhang,et al. WOTBoost: Weighted Oversampling Technique in Boosting for imbalanced learning , 2019, 2019 IEEE International Conference on Big Data (Big Data).
[75] Durga Toshniwal,et al. Unsupervised outlier detection in streaming data using weighted clustering , 2012, 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA).
[76] Carlisle Adams,et al. Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset , 2020, WiseML@WiSec.
[77] Kwangjo Kim,et al. Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[78] Jaideep Srivastava,et al. Data Mining for Network Intrusion Detection , 2002 .
[79] Ridwan Nur Wibowo,et al. NSL-KDD Dataset , 2019 .
[80] Siddique Latif,et al. Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[81] Xin Du,et al. A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework , 2020, IEEE Transactions on Information Forensics and Security.
[82] Rahul Kumar,et al. Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure , 2020, 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS).
[83] Akhan Akbulut,et al. Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic , 2020, Comput. Networks.
[84] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[85] Robertas Damasevicius,et al. LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection , 2020, Electronics.
[86] KeeganNathan,et al. A survey of cloud-based network intrusion detection analysis , 2016 .
[87] Salvatore Rampone,et al. Towards Near-Real-Time Intrusion Detection for IoT Devices using Supervised Learning and Apache Spark , 2020, Electronics.
[88] Seyed Mojtaba Hosseini Bamakan,et al. Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem , 2017, Knowl. Based Syst..
[89] Nader Pouratian,et al. Big Data defined: a practical review for neurosurgeons. , 2019, World neurosurgery.
[90] FaloutsosChristos,et al. Catching Synchronized Behaviors in Large Networks , 2016 .
[91] Sangarapillai Lambotharan,et al. Anomaly-Based Network Intrusion Detection Using SVM , 2019, 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP).
[92] Roberto Therón,et al. UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs , 2018, Comput. Secur..
[93] Bernabé Dorronsoro,et al. Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches , 2020, Applied Sciences.
[94] Hao Wang,et al. Learning concept-drifting data streams with random ensemble decision trees , 2015, Neurocomputing.
[95] Pei-Chann Chang,et al. A population-based incremental learning approach with artificial immune system for network intrusion detection , 2016, Eng. Appl. Artif. Intell..
[96] S. O. Falaki,et al. NETWORK INTRUSION DETECTION BASED ON ROUGH SET AND K-NEAREST NEIGHBOUR , 2008 .
[97] Liu Dongxia,et al. An Intrusion Detection System Based on Honeypot Technology , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[98] Wei Liu,et al. A New Method of Fuzzy Support Vector Machine Algorithm for Intrusion Detection , 2020, Applied Sciences.
[99] Ankur Taly,et al. Explainable AI in Industry: Practical Challenges and Lessons Learned , 2020, WWW.
[100] Yuni Xia,et al. GPU-Accelerated Outlier Detection for Continuous Data Streams , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS).
[101] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[102] Nagarathna Ravi,et al. Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions in IoT Network , 2020, IEEE Internet of Things Journal.
[103] Daniel L. Marino,et al. An Adversarial Approach for Explainable AI in Intrusion Detection Systems , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[104] Chuan-Yu Chang,et al. Network Anomaly Detection inside Consumer Networks—A Hybrid Approach , 2020, Electronics.
[105] Yongzhong Li,et al. Intrusion Detection Algorithm Based on Semi-supervised Learning , 2011, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences.
[106] Mohamed Rida,et al. A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection , 2018, Comput. Secur..
[107] Sheng Wang,et al. BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset , 2020, IEEE Access.
[108] Jinping Liu,et al. Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection , 2020, Expert Syst. Appl..
[109] R. Polikar,et al. An incremental learning algorithm with confidence estimation for automated identification of NDE signals , 2004, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control.
[110] Shie-Jue Lee,et al. Network intrusion detection using equality constrained-optimization-based extreme learning machines , 2018, Knowl. Based Syst..
[111] Ekin D. Cubuk,et al. A Fourier Perspective on Model Robustness in Computer Vision , 2019, NeurIPS.
[112] B. Surendiran,et al. Dimensionality reduction using Principal Component Analysis for network intrusion detection , 2016 .
[113] Xiangjian He,et al. Network Intrusion Detection based on LDA for payload feature selection , 2010, 2010 IEEE Globecom Workshops.
[114] Rose Qingyang Hu,et al. Data-Driven Edge Intelligence for Robust Network Anomaly Detection , 2020, IEEE Transactions on Network Science and Engineering.
[115] Andreas Hotho,et al. Flow-based benchmark data sets for intrusion detection , 2017 .
[116] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[117] Feng Xie,et al. Data fusion detection model based on SVM and evidence theory , 2012, 2012 IEEE 14th International Conference on Communication Technology.
[118] Julio Ortega Lopera,et al. PCA filtering and probabilistic SOM for network intrusion detection , 2015, Neurocomputing.
[119] Arputharaj Kannan,et al. Network intrusion detection system using genetic network programming with support vector machine , 2012, ICACCI '12.
[120] Huyin Zhang,et al. Network Intrusion Detection Based on PSO-Xgboost Model , 2020, IEEE Access.
[121] Erdogan Dogdu,et al. Intrusion Detection Using Big Data and Deep Learning Techniques , 2019, ACM Southeast Regional Conference.
[122] Nick Cercone,et al. Applying Knowledge Discovery to Predict Water-Supply Consumption , 1997, IEEE Expert.
[123] Dan Wang,et al. An Effective Feature Selection Approach for Network Intrusion Detection , 2013, 2013 IEEE Eighth International Conference on Networking, Architecture and Storage.
[124] Ying Gao,et al. A Novel Semi-Supervised Learning Approach for Network Intrusion Detection on Cloud-Based Robotic System , 2018, IEEE Access.
[125] Andrew J. Clark,et al. Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..
[126] Dong YuanTong. Research of Intrusion Detection Method Based on IL-FSVM , 2019, 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC).
[127] Yu Lasheng,et al. Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection , 2018, IEEE Access.
[128] Nicholas Kolokotronis,et al. A Novel Online Incremental Learning Intrusion Prevention System , 2019, 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[129] Gail-Joon Ahn,et al. vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems , 2018, CCS.
[130] Ali Bou Nassif,et al. Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection , 2019, Comput. Networks.
[131] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[132] Manas Ranjan Patra,et al. A Hybrid Intelligent Approach for Network Intrusion Detection , 2012 .
[133] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[134] Jiadong Ren,et al. A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection , 2019, IEEE Access.
[135] Jinping Liu,et al. ANID-SEoKELM: Adaptive network intrusion detection based on selective ensemble of kernel ELMs with random features , 2019, Knowl. Based Syst..
[136] Fan Zhang,et al. An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units , 2018, IEEE Access.
[137] Sandra Scott-Hayward,et al. Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs , 2019, 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).
[138] Xiaojiang Du,et al. Adversarial Attacks for Image Segmentation on Multiple Lightweight Models , 2020, IEEE Access.
[139] Aili Wang,et al. Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network , 2020, IEEE Access.
[140] Michele Colajanni,et al. Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).
[141] Shahram Sarkani,et al. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..
[142] I. Sumaiya Thaseen,et al. An integrated intrusion detection model using consistency based feature selection and LPBoost , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).
[143] V. S. Shankar Sriram,et al. Development of Rough Set - Hypergraph Technique for Key Feature Identification in Intrusion Detection Systems , 2017, Comput. Electr. Eng..
[144] Hadis Karimipour,et al. Cyber intrusion detection by combined feature selection algorithm , 2019, J. Inf. Secur. Appl..
[145] Shuyu Chen,et al. Incremental k-NN SVM method in intrusion detection , 2017, 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS).
[146] Mahesh Shirole,et al. Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives , 2018, 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS).
[147] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[148] Kasun Amarasinghe,et al. Explaining What a Neural Network has Learned: Toward Transparent Classification , 2019, 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[149] ShiYong,et al. An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016 .
[150] R. Newman. Computer Security: Protecting Digital Resources , 2009 .
[151] Punam Bedi,et al. Siam-IDS: Handling class imbalance problem in Intrusion Detection Systems using Siamese Neural Network , 2020 .
[152] Ilsun You,et al. Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions , 2012, 2012 15th International Conference on Network-Based Information Systems.
[153] Yonghao Gu,et al. Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection Algorithm , 2019, IEEE Access.
[154] Andreas Hotho,et al. A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..
[155] William Eberle,et al. Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response , 2020, AAAI Spring Symposium: Combining Machine Learning with Knowledge Engineering.
[156] B. Ravichandran,et al. Statistical traffic modeling for network intrusion detection , 2000, Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728).
[157] Miad Faezipour,et al. Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic , 2019, IEEE Sensors Letters.
[158] Kensuke Fukuda,et al. MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking , 2010, CoNEXT.
[159] Belaid Moa,et al. Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking , 2020, Comput. Secur..
[160] Marina Thottan,et al. Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..
[161] Mohanad Sarhan,et al. An Explainable Machine Learning-based Network Intrusion Detection System for Enabling Generalisability in Securing IoT Networks , 2021, ArXiv.
[162] Andreas Hotho,et al. Flow-based Network Traffic Generation using Generative Adversarial Networks , 2018, Comput. Secur..
[163] Nacira Ghoualmi Zine,et al. A New Approach for Adaptive Intrusion Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[164] MANABU ICHINO,et al. Optimum feature selection by zero-one integer programming , 1984, IEEE Transactions on Systems, Man, and Cybernetics.
[165] Zhong Ming,et al. An improved NSGA-III algorithm for feature selection used in intrusion detection , 2017, Knowl. Based Syst..
[166] Kangfeng Zheng,et al. An Explainable Machine Learning Framework for Intrusion Detection Systems , 2020, IEEE Access.
[167] Tong Li,et al. Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification , 2020, Inf. Sci..
[168] Dedy Dwi Prastyo,et al. Robust adaptive multivariate Hotelling's T2 control chart based on kernel density estimation for intrusion detection system , 2020, Expert Syst. Appl..
[169] Diego Reforgiato Recupero,et al. A Discretized Extended Feature Space (DEFS) Model to Improve the Anomaly Detection Performance in Network Intrusion Detection Systems , 2019, KDIR.
[170] Abderezak Touzene,et al. Fast Binary Network Intrusion Detection based on Matched Filter Optimization , 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT).
[171] Jill Slay,et al. The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems , 2015, 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[172] Milos Manic,et al. Toward Explainable Deep Neural Network Based Anomaly Detection , 2018, 2018 11th International Conference on Human System Interaction (HSI).
[173] Simon S. Woo,et al. CANTransfer: transfer learning based intrusion detection on a controller area network using convolutional LSTM network , 2020, SAC.
[174] Yuya Tarutani,et al. Toward an Online Network Intrusion Detection System Based on Ensemble Learning , 2019, 2019 IEEE 12th International Conference on Cloud Computing (CLOUD).
[175] Ji Won Kim,et al. CNN-Based Network Intrusion Detection against Denial-of-Service Attacks , 2020, Electronics.
[176] Arputharaj Kannan,et al. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.
[177] Ajith Abraham,et al. Intrusion detection using error correcting output code based ensemble , 2014, 2014 14th International Conference on Hybrid Intelligent Systems.
[178] Yasser Morgan,et al. Real-time Support Vector Machine based Network Intrusion Detection system using Apache Storm , 2016, 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[179] André C. Drummond,et al. A Survey of Random Forest Based Methods for Intrusion Detection Systems , 2018, ACM Comput. Surv..
[180] Wei Xu,et al. Incremental SVM based on reserved set for network intrusion detection , 2011, Expert Syst. Appl..
[181] Hongpo Zhang,et al. An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset , 2020, Comput. Networks.
[182] Ali A. Ghorbani,et al. Improved competitive learning neural networks for network intrusion and fraud detection , 2012, Neurocomputing.
[183] Sachin Tripathi,et al. An efficient feature selection based Bayesian and Rough set approach for intrusion detection , 2020, Appl. Soft Comput..
[184] Steven Furnell,et al. D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks , 2014 .
[185] Maja J. Matarić. A Comparative Analysis of Reinforcement Learning Methods , 1991 .
[186] Christos Faloutsos,et al. Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms , 2016, IEEE Transactions on Knowledge and Data Engineering.
[187] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[188] Noorhaniza Wahid,et al. A hybrid network intrusion detection system using simplified swarm optimization (SSO) , 2012, Appl. Soft Comput..
[189] Ying Wang,et al. Research on Intrusion Detection Model using ensemble learning methods , 2016, 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS).
[190] Seyed Mojtaba Hosseini Bamakan,et al. An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016, Neurocomputing.
[191] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[192] Xiaoming Pan,et al. A Naive Feature Selection Method and Its Application in Network Intrusion Detection , 2010, 2010 International Conference on Computational Intelligence and Security.