Dataflow Feature Analysis for Industrial Networks Communication Security

[1]  Xiangjian He,et al.  Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.

[2]  Roberto Blanco,et al.  Tuning CNN Input Layout for IDS with Genetic Algorithms , 2018, HAIS.

[3]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[4]  Christian Diedrich,et al.  Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[5]  Sireesha Rodda,et al.  Class imbalance problem in the Network Intrusion Detection Systems , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[6]  Puja Padiya,et al.  Intrusion detection system by improved preprocessing methods and Naïve Bayes classifier using NSL-KDD 99 Dataset , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[7]  Sushanta Karmakar,et al.  A Neural Network based system for Intrusion Detection and attack classification , 2016, 2016 Twenty Second National Conference on Communication (NCC).

[8]  Phillip Kelly,et al.  Anomalies in network traffic , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[9]  Elena Sitnikova,et al.  Probability Risk Identification Based Intrusion Detection System for SCADA Systems , 2017, MONAMI.

[10]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[11]  José M. Fernandez,et al.  Providing SCADA Network Data Sets for Intrusion Detection Research , 2016, CSET @ USENIX Security Symposium.

[12]  Anamika Yadav,et al.  Performance analysis of NSL-KDD dataset using ANN , 2015, 2015 International Conference on Signal Processing and Communication Engineering Systems.

[13]  Fakhreddine Ghaffari,et al.  Check node unit for LDPC decoders based on one-hot data representation of messages , 2015 .

[14]  Gabriel Maciá-Fernández,et al.  Tackling the Big Data 4 vs for anomaly detection , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[15]  Puja Padiya,et al.  Improving classification using preprocessing and machine learning algorithms on NSL-KDD dataset , 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).

[16]  Aydin Behnad,et al.  On efficiency enhancement of the correlation-based feature selection for intrusion detection systems , 2016, 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[17]  Govind P. Gupta,et al.  A Framework for Fast and Efficient Cyber Security Network Intrusion Detection Using Apache Spark , 2016 .

[18]  William K. Robertson,et al.  Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks , 2013, ACSAC.

[19]  Samir Amir,et al.  Classifying and querying very large taxonomies with bit-vector encoding , 2015, Journal of Intelligent Information Systems.

[20]  Dewan Md Farid,et al.  Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs , 2014, The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014).

[21]  Seyed Mojtaba Hosseini Bamakan,et al.  An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016, Neurocomputing.

[22]  Krerk Piromsopa,et al.  Applying Hadoop for log analysis toward distributed IDS , 2013, ICUIMC '13.

[23]  Julio Ortega Lopera,et al.  Network Anomaly Classification by Support Vector Classifiers Ensemble and Non-linear Projection Techniques , 2013, HAIS.