Optimizing CNN-LSTM neural networks with PSO for anomalous query access control
暂无分享,去创建一个
[1] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[2] Elisa Bertino,et al. Access Control for Databases: Concepts and Systems , 2011, Found. Trends Databases.
[3] Qiang Wei,et al. RBAC-Based Access Control for SaaS Systems , 2010, 2010 2nd International Conference on Information Engineering and Computer Science.
[4] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[5] Jürgen Schmidhuber,et al. Deep learning in neural networks: An overview , 2014, Neural Networks.
[6] Sung-Bae Cho,et al. Evolutionary Learning of Modular Neural Networks with Genetic Programming , 1998, Applied Intelligence.
[7] Zheng Huang,et al. Detection of SQL injection based on artificial neural network , 2020, Knowl. Based Syst..
[8] K Sreelakshmi,et al. Deep Bi-Directional LSTM Network for Query Intent Detection , 2018 .
[9] Sung-Bae Cho,et al. Anomalous query access detection in RBAC-administered databases with random forest and PCA , 2016, Inf. Sci..
[10] Yaser Jararweh,et al. An insider threat aware access control for cloud relational databases , 2017, Cluster Computing.
[11] Sung-Bae Cho,et al. An Evolutionary Algorithm Approach to Optimal Ensemble Classifiers for DNA Microarray Data Analysis , 2008, IEEE Transactions on Evolutionary Computation.
[12] Junfeng Wang,et al. LSTM-Based SQL Injection Detection Method for Intelligent Transportation System , 2019, IEEE Transactions on Vehicular Technology.
[13] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[14] Mahmood Hussain Shah,et al. Information security management needs more holistic approach: A literature review , 2016, Int. J. Inf. Manag..
[15] Sung-Bae Cho,et al. Particle Swarm Optimization-based CNN-LSTM Networks for Forecasting Energy Consumption , 2019, 2019 IEEE Congress on Evolutionary Computation (CEC).
[16] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[17] Sung-Bae Cho,et al. Predicting residential energy consumption using CNN-LSTM neural networks , 2019, Energy.
[18] Saichon Jaiyen,et al. A New Hybrid Machine Learning for Cybersecurity Threat Detection Based on Adaptive Boosting , 2019, Appl. Artif. Intell..
[19] Sung-Bae Cho,et al. A convolutional neural-based learning classifier system for detecting database intrusion via insider attack , 2020, Inf. Sci..
[20] Sung-Bae Cho,et al. CNN-LSTM Neural Networks for Anomalous Database Intrusion Detection in RBAC-Administered Model , 2019, ICONIP.
[21] Sung-Bae Cho,et al. Adaptive Database Intrusion Detection Using Evolutionary Reinforcement Learning , 2017, SOCO-CISIS-ICEUTE.
[22] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[23] Kuheli Roy Sarkar. Assessing insider threats to information security using technical, behavioural and organisational measures , 2010, Inf. Secur. Tech. Rep..
[24] Ippokratis Pandis,et al. TPC-E vs. TPC-C: characterizing the new TPC-E benchmark via an I/O comparison study , 2011, SGMD.
[25] Jorge Lobo,et al. Privacy-aware role-based access control , 2010 .
[26] Trevor Darrell,et al. Long-term recurrent convolutional networks for visual recognition and description , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[27] Chee Kheong Siew,et al. Extreme learning machine: Theory and applications , 2006, Neurocomputing.
[28] Sung-Bae Cho,et al. Web traffic anomaly detection using C-LSTM neural networks , 2018, Expert Syst. Appl..
[29] Sung-Bae Cho,et al. Particle Swarm Optimization-Based CNN-LSTM Networks for Anomalous Query Access Control in RBAC-Administered Model , 2019, HAIS.
[30] Bolei Zhou,et al. Learning Deep Features for Discriminative Localization , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[31] Peter Rob,et al. Database systems : design, implementation, and management , 2000 .
[32] Aditya Dev Mishra,et al. Big data analytics for security and privacy challenges , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).
[33] M. Eric Johnson,et al. Information security and privacy in healthcare: current state of research , 2010, Int. J. Internet Enterp. Manag..