Convolutional Neural Networks for Multi-class Intrusion Detection System
暂无分享,去创建一个
[1] Mansour Sheikhan,et al. Intrusion detection using reduced-size RNN based on feature grouping , 2010, Neural Computing and Applications.
[2] Christian Diedrich,et al. Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[3] Santosh Kumar Sahu,et al. A detail analysis on intrusion detection datasets , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[4] Christian Diedrich,et al. Evaluation of hybrid deep learning techniques for ensuring security in networked control systems , 2017, 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[5] Xiaodong Gu,et al. Max-Pooling Dropout for Regularization of Convolutional Neural Networks , 2015, ICONIP.
[6] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[7] Kai Huang,et al. Intrusion Detection Using Convolutional Neural Networks for Representation Learning , 2017, ICONIP.
[8] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[9] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[10] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[11] Xiaodong Gu,et al. Towards dropout training for convolutional neural networks , 2015, Neural Networks.
[12] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[13] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[14] Md Zahangir Alom,et al. Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).
[15] Alexander Kott,et al. Cyber-security of SCADA and Other Industrial Control Systems , 2016, Advances in Information Security.
[16] Keiron O'Shea,et al. An Introduction to Convolutional Neural Networks , 2015, ArXiv.
[17] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[18] A. Malathi,et al. A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection , 2013 .
[19] Christian Diedrich,et al. Deep Feature Extraction for multi-Class Intrusion Detection in Industrial Control Systems , 2017 .
[20] Pranav Gokhale,et al. Applications of Convolutional Neural Networks , 2016 .
[21] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[22] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[23] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[24] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.