Network Intrusion Detection Based on an Improved Long-Short-Term Memory Model in Combination with Multiple Spatiotemporal Structures
暂无分享,去创建一个
[1] Lizhong Xu,et al. A Security Concept Based on Scaler Distribution of a Novel Intrusion Detection Device for Wireless Sensor Networks in a Smart Environment , 2020, Sensors.
[2] Nan Ding,et al. Real-time anomaly detection based on long short-Term memory and Gaussian Mixture Model , 2019, Comput. Electr. Eng..
[3] Georgios Spathoulas,et al. Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts , 2020, International Journal of Information Security.
[4] Gaoming Yang,et al. An intrusion detection algorithm for sensor network based on normalized cut spectral clustering , 2019, PloS one.
[5] Miad Faezipour,et al. Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic , 2019, IEEE Sensors Letters.
[6] Lixiang Li,et al. Nearest neighbors based density peaks approach to intrusion detection , 2018 .
[7] Fadi Al-Turjman,et al. An improved ensemble based intrusion detection technique using XGBoost , 2020, Trans. Emerg. Telecommun. Technol..
[8] Longqing Li,et al. Wireless Sensor Networks Intrusion Detection Based on SMOTE and the Random Forest Algorithm , 2019, Sensors.
[9] Haifang Li,et al. Object Tracking Algorithm based on Improved Context Model in Combination with Detection Mechanism for Suspected Objects , 2018, Multimedia Tools and Applications.
[10] Naveen K. Chilamkurti,et al. Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications , 2018, IEEE Communications Magazine.
[11] Haifang Li,et al. An Improved Two-steps Saliency Detection Algorithm based on Binarized Normed Gradients and Nuclear Norm Model in Video Sequences , 2018, J. Inf. Hiding Multim. Signal Process..
[12] Hongpo Zhang,et al. An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset , 2020, Comput. Networks.
[13] Michał Choraś,et al. A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection , 2020, Sensors.
[14] Lei Yang,et al. Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..
[15] Muhammad Sher,et al. A two-stage flow-based intrusion detection model for next-generation networks , 2018, PloS one.
[16] Mu Zhou,et al. Indoor intrusion detection based on fuzzy membership-aided Dempster-Shaper theory , 2020, J. Intell. Fuzzy Syst..
[17] Dongrui Wu,et al. A Novel Negative-Transfer-Resistant Fuzzy Clustering Model With a Shared Cross-Domain Transfer Latent Space and its Application to Brain CT Image Segmentation , 2020, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[18] Jun-Ho Huh,et al. Implementation of lightweight intrusion detection model for security of smart green house and vertical farm , 2018, Int. J. Distributed Sens. Networks.
[19] Carlos Becker Westphall,et al. Autonomic Intrusion Detection and Response Using Big Data , 2020, IEEE Systems Journal.
[20] Prajoona Valsalan,et al. Retracted: Intrusion detection in cloud environment using hybrid genetic algorithm and back propagation neural network , 2020, International Journal of Communication Systems.
[21] Amin Karami,et al. An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities , 2018, Expert Syst. Appl..
[22] Daojing He,et al. Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems , 2019, IEEE Network.
[23] Ning Wang,et al. An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application , 2020, Sensors.
[24] Dongrui Wu,et al. EEG-Based Driver Drowsiness Estimation Using an Online Multi-View and Transfer TSK Fuzzy System , 2021, IEEE Transactions on Intelligent Transportation Systems.
[25] Mahesh Kumar Prasath,et al. A meta-heuristic Bayesian network classification for intrusion detection , 2019, Int. J. Netw. Manag..
[26] Haifang Li,et al. Object Tracking Algorithm based on Improved Siamese Convolutional Networks Combined with Deep Contour Extraction and Object Detection Under Airborne Platform , 2020 .
[27] Maode Ma,et al. A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology , 2019, Knowl. Based Syst..
[28] V. S. Shankar Sriram,et al. An Improved Rough Set Theory based Feature Selection Approach for Intrusion Detection in SCADA Systems , 2019, J. Intell. Fuzzy Syst..
[29] Luigi Pontieri,et al. A GP-based ensemble classification framework for time-changing streams of intrusion detection data , 2020, Soft Computing.
[30] Weizhi Meng,et al. Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling , 2018, Computer.
[31] Halit Alptekin,et al. Intrusion Detection Over Encrypted Network Data , 2020, Comput. J..
[32] Kaijian Xia,et al. A Novel Distributed Multitask Fuzzy Clustering Algorithm for Automatic MR Brain Image Segmentation , 2019, Journal of Medical Systems.
[33] Christos Diou,et al. Of daemons and men: reducing false positive rate in intrusion detection systems with file system footprint analysis , 2018, Neural Computing and Applications.
[34] Rui-Hong Dong,et al. Network intrusion detection model based on multivariate correlation analysis - long short-time memory network , 2020, IET Inf. Secur..
[35] Deepali Bankatsingh Gothawal,et al. Anomaly-Based Intrusion Detection System in RPL by Applying Stochastic and Evolutionary Game Models over IoT Environment , 2019, Wireless Personal Communications.
[36] Shengzhe Wang,et al. Bayesian Framework with Non-local and Low-rank Constraint for Image Reconstruction , 2017 .
[37] Seong Oun Hwang,et al. Study of long short-term memory in flow-based network intrusion detection system , 2018, J. Intell. Fuzzy Syst..