Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network using Gated Recurrent Neural Networks (GRU)
暂无分享,去创建一个
[1] Howon Kim,et al. An Effective Intrusion Detection Classifier Using Long Short-Term Memory with Gradient Descent Optimization , 2017, 2017 International Conference on Platform Technology and Service (PlatCon).
[2] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[3] Rachid Beghdad,et al. TRAINING ALL THE KDD DATA SET TO CLASSIFY AND DETECT ATTACKS , 2007 .
[4] Ilangko Balasingham,et al. Risk-based adaptive security for smart IoT in eHealth , 2012, BODYNETS.
[5] Yu-Lin He,et al. Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..
[6] Howon Kim,et al. Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization , 2015, WISA.
[7] Shun-ichi Amari,et al. Network information criterion-determining the number of hidden units for an artificial neural network model , 1994, IEEE Trans. Neural Networks.
[8] Rong Zheng,et al. Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.
[9] Ke Xu,et al. Toward software defined smart home , 2016, IEEE Communications Magazine.
[10] Ralf C. Staudemeyer,et al. Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data , 2013, SAICSIT '13.
[11] Abdolreza Mirzaei,et al. Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..
[12] Sung-Bae Cho,et al. Detecting intrusion with rule-based integration of multiple models , 2003, Comput. Secur..
[13] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[14] Jürgen Schmidhuber,et al. LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[15] Satinder Singh,et al. Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.
[16] Ethem Alpaydin,et al. Introduction to machine learning , 2004, Adaptive computation and machine learning.
[17] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[18] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[19] Yong Wang,et al. A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder , 2016, Inf..
[20] Sumeet Dua,et al. Data Mining and Machine Learning in Cybersecurity , 2011 .
[21] Li Guo,et al. An active learning based TCM-KNN algorithm for supervised network intrusion detection , 2007, Comput. Secur..
[22] Chih-Fong Tsai,et al. A triangle area based nearest neighbors approach to intrusion detection , 2010, Pattern Recognit..
[23] Md. Al Mehedi Hasan,et al. Feature Selection for Intrusion Detection Using Random Forest , 2016 .
[24] Ralf C. Staudemeyer,et al. Applying long short-term memory recurrent neural networks to intrusion detection , 2015 .
[25] Zhaohui Wu,et al. Trace analysis and mining for smart cities: issues, methods, and applications , 2013, IEEE Communications Magazine.
[26] Xiaohui Chang,et al. A large-scale web QoS prediction scheme for the Industrial Internet of Things based on a kernel machine learning algorithm , 2016, Comput. Networks.
[27] Howon Kim,et al. An Approach to Build an Efficient Intrusion Detection Classifier , 2015 .