Intrusion Detection System Based on Network Traffic Using Deep Neural Networks
暂无分享,去创建一个
Stavros Papadopoulos | Dimitrios Tzovaras | Konstantinos M. Giannoutakis | Petros Toupas | Dimitra Chamou | Anastasios Drosou | Eleni Ketzaki | K. M. Giannoutakis | D. Tzovaras | A. Drosou | Stavros Papadopoulos | Petros Toupas | Dimitra Chamou | Eleni Ketzaki
[1] Hannes Holm,et al. Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter? , 2014, 2014 47th Hawaii International Conference on System Sciences.
[2] Gonzalo Álvarez,et al. PUMA: Permission Usage to Detect Malware in Android , 2012, CISIS/ICEUTE/SOCO Special Sessions.
[3] Narmeen Zakaria Bawany,et al. DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions , 2017, Arabian Journal for Science and Engineering.
[4] Dimitrios Tzovaras,et al. Acceleration at the Edge for Supporting SMEs Security: The FORTIKA Paradigm , 2019, IEEE Communications Magazine.
[5] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[6] Qianru Zhou,et al. Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection - An Analysis on CIC-AWS-2018 dataset , 2019, ArXiv.
[7] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[8] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[9] Jun Zhang,et al. Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions , 2023, IEEE Transactions on Information Forensics and Security.
[10] Chao Liu,et al. ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[11] Andrei Vladyko,et al. A fuzzy logic-based information security management for software-defined networks , 2014, 16th International Conference on Advanced Communication Technology.
[12] Vijay Laxmi,et al. AndroSimilar: robust statistical feature signature for Android malware detection , 2013, SIN.
[13] Raphael C.-W. Phan,et al. Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[14] Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[15] Celia Paulsen,et al. Cybersecuring Small Businesses , 2016, Computer.
[16] Rizwana Rehman,et al. Publication of Little Lion Scientific R & D , Islamabad PAKISTAN MALWARE THREATS AND MITIGATION STRATEGIES : A SURVEY , 2011 .
[17] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[18] Rodrigo Braga,et al. Lightweight DDoS flooding attack detection using NOX/OpenFlow , 2010, IEEE Local Computer Network Conference.
[19] Gui Yun Tian,et al. Deep Learning Models for Cyber Security in IoT Networks , 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).
[20] Chun-Ying Huang,et al. Performance Evaluation on Permission-Based Detection for Android Malware , 2013 .
[21] Xu Chen,et al. Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data , 2019, IEEE Access.
[22] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[23] Martín Abadi,et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.
[24] V Jyothsna,et al. A Review of Anomaly based Intrusion Detection Systems , 2011 .
[25] Tülin Atmaca,et al. Intrusion Detection with Comparative Analysis of Supervised Learning Techniques and Fisher Score Feature Selection Algorithm , 2018, ISCIS.