Optimizing CNN-LSTM neural networks with PSO for anomalous query access control

[1]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[2]  Elisa Bertino,et al.  Access Control for Databases: Concepts and Systems , 2011, Found. Trends Databases.

[3]  Qiang Wei,et al.  RBAC-Based Access Control for SaaS Systems , 2010, 2010 2nd International Conference on Information Engineering and Computer Science.

[4]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[5]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[6]  Sung-Bae Cho,et al.  Evolutionary Learning of Modular Neural Networks with Genetic Programming , 1998, Applied Intelligence.

[7]  Zheng Huang,et al.  Detection of SQL injection based on artificial neural network , 2020, Knowl. Based Syst..

[8]  K Sreelakshmi,et al.  Deep Bi-Directional LSTM Network for Query Intent Detection , 2018 .

[9]  Sung-Bae Cho,et al.  Anomalous query access detection in RBAC-administered databases with random forest and PCA , 2016, Inf. Sci..

[10]  Yaser Jararweh,et al.  An insider threat aware access control for cloud relational databases , 2017, Cluster Computing.

[11]  Sung-Bae Cho,et al.  An Evolutionary Algorithm Approach to Optimal Ensemble Classifiers for DNA Microarray Data Analysis , 2008, IEEE Transactions on Evolutionary Computation.

[12]  Junfeng Wang,et al.  LSTM-Based SQL Injection Detection Method for Intelligent Transportation System , 2019, IEEE Transactions on Vehicular Technology.

[13]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[14]  Mahmood Hussain Shah,et al.  Information security management needs more holistic approach: A literature review , 2016, Int. J. Inf. Manag..

[15]  Sung-Bae Cho,et al.  Particle Swarm Optimization-based CNN-LSTM Networks for Forecasting Energy Consumption , 2019, 2019 IEEE Congress on Evolutionary Computation (CEC).

[16]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[17]  Sung-Bae Cho,et al.  Predicting residential energy consumption using CNN-LSTM neural networks , 2019, Energy.

[18]  Saichon Jaiyen,et al.  A New Hybrid Machine Learning for Cybersecurity Threat Detection Based on Adaptive Boosting , 2019, Appl. Artif. Intell..

[19]  Sung-Bae Cho,et al.  A convolutional neural-based learning classifier system for detecting database intrusion via insider attack , 2020, Inf. Sci..

[20]  Sung-Bae Cho,et al.  CNN-LSTM Neural Networks for Anomalous Database Intrusion Detection in RBAC-Administered Model , 2019, ICONIP.

[21]  Sung-Bae Cho,et al.  Adaptive Database Intrusion Detection Using Evolutionary Reinforcement Learning , 2017, SOCO-CISIS-ICEUTE.

[22]  Geoffrey E. Hinton,et al.  Visualizing Data using t-SNE , 2008 .

[23]  Kuheli Roy Sarkar Assessing insider threats to information security using technical, behavioural and organisational measures , 2010, Inf. Secur. Tech. Rep..

[24]  Ippokratis Pandis,et al.  TPC-E vs. TPC-C: characterizing the new TPC-E benchmark via an I/O comparison study , 2011, SGMD.

[25]  Jorge Lobo,et al.  Privacy-aware role-based access control , 2010 .

[26]  Trevor Darrell,et al.  Long-term recurrent convolutional networks for visual recognition and description , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[27]  Chee Kheong Siew,et al.  Extreme learning machine: Theory and applications , 2006, Neurocomputing.

[28]  Sung-Bae Cho,et al.  Web traffic anomaly detection using C-LSTM neural networks , 2018, Expert Syst. Appl..

[29]  Sung-Bae Cho,et al.  Particle Swarm Optimization-Based CNN-LSTM Networks for Anomalous Query Access Control in RBAC-Administered Model , 2019, HAIS.

[30]  Bolei Zhou,et al.  Learning Deep Features for Discriminative Localization , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[31]  Peter Rob,et al.  Database systems : design, implementation, and management , 2000 .

[32]  Aditya Dev Mishra,et al.  Big data analytics for security and privacy challenges , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[33]  M. Eric Johnson,et al.  Information security and privacy in healthcare: current state of research , 2010, Int. J. Internet Enterp. Manag..