Evaluating Neural Networks using Bi-Directional LSTM for Network IDS (Intrusion Detection Systems) in Cyber Security
暂无分享,去创建一个
[1] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[2] Adnan Shahid Khan,et al. Network intrusion detection system: A systematic study of machine learning and deep learning approaches , 2020, Trans. Emerg. Telecommun. Technol..
[3] Salvatore J. Stolfo,et al. Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.
[4] Bernabé Dorronsoro,et al. Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches , 2020, Applied Sciences.
[5] Anand Nayyar,et al. Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation , 2021, Computers, Materials & Continua.
[6] Keping Yu,et al. Robust Spammer Detection Using Collaborative Neural Network in Internet-of-Things Applications , 2021, IEEE Internet of Things Journal.
[7] Charles Elkan,et al. Results of the KDD'99 classifier learning , 2000, SKDD.
[8] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[9] B. G. Premasudha,et al. Electroencephalogram for epileptic seizure detection using stacked bidirectional LSTM_GAP neural network , 2020, Evolutionary Intelligence.
[10] Kiran,et al. Analysis and Computation of Encryption Technique to Enhance Security of Medical Images , 2020, IOP Conference Series: Materials Science and Engineering.
[11] Akbar Siami Namin,et al. The Performance of LSTM and BiLSTM in Forecasting Time Series , 2019, 2019 IEEE International Conference on Big Data (Big Data).
[12] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[13] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[15] K. A. Taher,et al. Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection , 2019, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST).
[16] Dinh-Thuan Do,et al. Enabling Multiple Power Beacons for Uplink of NOMA-Enabled Mobile Edge Computing in Wirelessly Powered IoT , 2020, IEEE Access.
[17] Jin-Wook Chung,et al. Network Intrusion Detection Through Genetic Feature Selection , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).
[18] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..
[19] Kwangjo Kim,et al. Deep learning in intrusion detection perspective: Overview and further challenges , 2017, 2017 International Workshop on Big Data and Information Security (IWBIS).
[20] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[21] Abdallah Shami,et al. Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection , 2020, IEEE Transactions on Network and Service Management.
[22] Paul J. Werbos,et al. Backpropagation Through Time: What It Does and How to Do It , 1990, Proc. IEEE.
[23] Tu N. Nguyen,et al. On Virtual Id Assignment in Networks for High Resilience Routing: A Theoretical Framework , 2020, GLOBECOM 2020 - 2020 IEEE Global Communications Conference.
[24] Fan Xiong,et al. Epileptic seizure detection and prediction using stacked bidirectional long short term memory , 2019, Pattern Recognit. Lett..
[25] Giovanni Soda,et al. Exploiting the past and the future in protein secondary structure prediction , 1999, Bioinform..
[26] Yoshua Bengio,et al. Quadratic Features and Deep Architectures for Chunking , 2009, NAACL.
[27] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[28] Ramesh C. Agarwal,et al. PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection) , 2001, SDM.
[29] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[30] Malcolm I. Heywood,et al. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 , 2005, PST.
[31] Yuehui Chen,et al. Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree , 2005, ISNN.
[32] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[33] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[34] Andrzej Stateczny,et al. Dynamic Route Discovery Using Modified Grasshopper Optimization Algorithm in Wireless Ad-Hoc Visible Light Communication Network , 2021, Electronics.
[35] Prabaharan Poornachandran,et al. Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[36] Dinh-Thuan Do,et al. WRSNs: Toward an Efficient Scheduling for Mobile Chargers , 2020, IEEE Sensors Journal.
[37] Bernhard Pfahringer,et al. Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.
[38] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[39] L. Girish,et al. Anomaly detection in cloud environment using artificial intelligence techniques , 2021, Computing.
[40] Heidar A. Malki,et al. Network Intrusion Detection System Using Neural Networks , 2008, 2008 Fourth International Conference on Natural Computation.
[41] Miheev Vladimir,et al. The MP13 approach to the KDD'99 classifier learning contest , 2000 .
[42] Peter Tino,et al. IEEE Transactions on Neural Networks , 2009 .
[43] Sara Matzner,et al. An application of machine learning to network intrusion detection , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[44] Miad Faezipour,et al. Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.
[45] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[46] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[47] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .