A deep learning approach with Bayesian optimization and ensemble classifiers for detecting denial of service attacks
暂无分享,去创建一个
Zafer Aydin | V. C. Gungor | Vehbi Cagri Gungor | Yasin Gormez | Ramazan Karademir | Z. Aydın | Yasin Gormez | Ramazan Karademir
[1] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[2] Liang Hong,et al. Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation , 2018 .
[3] S. Cessie,et al. Ridge Estimators in Logistic Regression , 1992 .
[4] Gisung Kim,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..
[5] Jerzy Stefanowski,et al. Multi-class and feature selection extensions of Roughly Balanced Bagging for imbalanced data , 2018, Journal of Intelligent Information Systems.
[6] David W. Aha,et al. Instance-Based Learning Algorithms , 1991, Machine Learning.
[7] Zafer Aydin,et al. Intelligent Anomaly Detection Techniques for Denial of Service Attacks , 2018 .
[8] Ali Sadr,et al. Automatic microstructural characterization and classification using dual tree complex wavelet-based features and Bees Algorithm , 2016, Neural Computing and Applications.
[9] Miad Faezipour,et al. Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.
[10] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[11] Devesh Kumar Srivastava,et al. Network Intrusion Detection in Big Dataset Using Spark , 2018 .
[12] Geert Deconinck,et al. Tackling Application-layer DDoS Attacks , 2012, ANT/MobiWIS.
[13] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[14] David H. Wolpert,et al. Stacked generalization , 1992, Neural Networks.
[15] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[16] Abdullah Al Nahid,et al. Effective Intrusion Detection System Using XGBoost , 2018, Inf..
[17] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[18] Siyang Zhang,et al. A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..
[19] Basit Qureshi,et al. On Energy Efficiency and Performance Evaluation of Single Board Computer Based Clusters: A Hadoop Case Study , 2019, Electronics.
[20] Zhenyu Liu,et al. A method of SVM with Normalization in Intrusion Detection , 2011 .
[21] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[22] Aiko Pras,et al. An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.
[23] Norrozila Sulaiman,et al. A novel intrusion detection system by using intelligent data mining in weka environment , 2011, WCIT.
[24] Jiankun Hu,et al. Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling , 2017, J. Netw. Comput. Appl..
[25] José Paulo Leal,et al. EmoSpell, a Morphological and Emotional Word Analyzer , 2018, Inf..