On the Feasibility of Deep Learning in Sensor Network Intrusion Detection
暂无分享,去创建一个
[1] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[2] Bilal Maqbool Beigh,et al. Performance evaluation of different intrusion detection system: An empirical approach , 2014, 2014 International Conference on Computer Communication and Informatics.
[3] Ridha Bouallegue,et al. An optimized weight-based clustering algorithm in wireless sensor networks , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[4] Carla Purdy,et al. Toward an Online Anomaly Intrusion Detection System Based on Deep Learning , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[5] Md. Enamul Haque,et al. Adaptive Hybrid Model for Network Intrusion Detection and Comparison among Machine Learning Algorithms , 2015 .
[6] Hesham N. Elmahdy,et al. A New Approach for Evaluating Intrusion Detection System , 2010 .
[7] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[8] Sanghyun Seo,et al. Improvement of Network Intrusion Detection Accuracy by Using Restricted Boltzmann Machine , 2016, 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN).
[9] Md Zahangir Alom,et al. Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).
[10] Burak Kantarci,et al. Detection of Known and Unknown Intrusive Sensor Behavior in Critical Applications , 2017, IEEE Sensors Letters.
[11] Miguel Correia,et al. A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection , 2017, IWANN.
[12] Heba F. Eid,et al. Hybrid Intelligent Intrusion Detection Scheme , 2011 .
[13] Mahesh Chandra Govil,et al. A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).
[14] Wei Zhang,et al. A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[15] H. T. Mouftah,et al. Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures , 2018, 2018 IEEE International Conference on Communications (ICC).
[16] Nicholas D. Lane,et al. Can Deep Learning Revolutionize Mobile Sensing? , 2015, HotMobile.