Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach
暂无分享,去创建一个
[1] Michal Choras,et al. Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project , 2021, ARES.
[2] Izzat Alsmadi,et al. Machine learning approaches to IoT security: A systematic literature review , 2021, Internet Things.
[3] Jacek Rumiński,et al. A survey of neural networks usage for intrusion detection systems , 2020, Journal of Ambient Intelligence and Humanized Computing.
[4] Abdelouahid Derhab,et al. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues , 2020, Knowl. Based Syst..
[5] Mohamed Amine Ferrag,et al. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study , 2020, J. Inf. Secur. Appl..
[6] Cheng Xing,et al. An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks , 2019, IEEE Access.
[7] Michal Choras,et al. Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection , 2018, Secur. Commun. Networks.
[8] Prabaharan Poornachandran,et al. Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[9] Jinoh Kim,et al. A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.
[10] Kwangjo Kim,et al. Deep learning in intrusion detection perspective: Overview and further challenges , 2017, 2017 International Workshop on Big Data and Information Security (IWBIS).
[11] Robert C. Atkinson,et al. Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey , 2017, ArXiv.
[12] Kwangjo Kim,et al. Deep Learning in Intrusion Detection System: An Overview , 2016 .
[13] Ameet Talwalkar,et al. Hyperband: A Novel Bandit-Based Approach to Hyperparameter Optimization , 2016, J. Mach. Learn. Res..
[14] Katarzyna Wasielewska,et al. Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection , 2021, IEEE Access.
[15] Michal Choras,et al. Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data , 2021, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[16] Georgia Sakellari,et al. Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.
[17] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.