Review on Intelligent Algorithms for Cyber Security
暂无分享,去创建一个
[1] Guolong Chen,et al. PSO-BPNN-Based Prediction of Network Security Situation , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.
[2] Said El Kafhali,et al. DDoS attack detection using machine learning techniques in cloud computing environments , 2017, 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech).
[3] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[4] Arvinder Kaur,et al. Hybridization of K-Means and Firefly Algorithm for intrusion detection system , 2018, Int. J. Syst. Assur. Eng. Manag..
[5] Erdogan Dogdu,et al. Phishing e-mail detection by using deep learning algorithms , 2018, ACM Southeast Regional Conference.
[6] Michele Colajanni,et al. On the effectiveness of machine and deep learning for cyber security , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).
[7] Andrew H. Sung,et al. Detection of Phishing Attacks: A Machine Learning Approach , 2008, Soft Computing Applications in Industry.
[8] Victor C. M. Leung,et al. Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment , 2018, Wirel. Commun. Mob. Comput..
[9] Xuan Dau Hoang,et al. Botnet Detection Based On Machine Learning Techniques Using DNS Query Data , 2018, Future Internet.
[10] Ghulam Ali Mallah,et al. Implication of Genetic Algorithm in Cryptography to Enhance Security , 2018 .
[11] Pradeep Kumar Krishnappa,et al. Investigating Open Issues in Swarm Intelligence for Mitigating Security Threats in MANET , 2015 .
[12] Karthikeyan Eswaramoorthy,et al. Ant Colony Optimization Based Handoff Scheme and Verifiable Secret Sharing Security with M-M Scheme for VoIP , 2017 .
[13] Benny Pinkas,et al. Deceiving End-to-End Deep Learning Malware Detectors using Adversarial Examples , 2018, 1802.04528.
[14] Khaled M. Elleithy,et al. A Highly Accurate Deep Learning Based Approach for Developing Wireless Sensor Network Middleware , 2018, IEEE Access.
[15] Nidaa F. Hassan,et al. Designing a smartphone honeypot system using performance counters , 2017 .
[16] Jerry Murphree,et al. Machine learning anomaly detection in large systems , 2016, 2016 IEEE AUTOTESTCON.
[17] Je-Won Kang,et al. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.
[18] Pierre Parrend,et al. Morwilog: an ACO-based system for outlining multi-step attacks , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).
[19] Anuradha Pillai,et al. Applications of Machine Learning in Cyber Security , 2020, Handbook of Research on Machine and Deep Learning Applications for Cyber Security.
[20] Mohd Afizi Mohd Shukran,et al. A NOVEL ANOMALY-NETWORK INTRUSION DETECTION SYSTEM USING ABC ALGORITHMS , 2012 .
[21] Waleed Ali,et al. Phishing Website Detection based on Supervised Machine Learning with Wrapper Features Selection , 2017 .
[22] Monther Aldwairi,et al. Application of artificial bee colony for intrusion detection systems , 2015, Secur. Commun. Networks.
[23] Robert Sowah,et al. Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN) , 2019, J. Comput. Networks Commun..
[24] Jinoh Kim,et al. A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.
[25] Sargur N. Srihari,et al. Machine Learning for Signature Verification , 2006, ICVGIP.
[26] M. A. Faizal,et al. Machine Learning for HTTP Botnet Detection Using Classifier Algorithms , 2018 .
[27] S. Anbuchelian,et al. Improving security in Wireless Sensor Network using trust and metaheuristic algorithms , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).
[28] Vineet Richariya,et al. Ant Colony Optimization with Classification Algorithms used for Intrusion Detection , 2012 .
[29] A HodashinskyI.,et al. Constructing a Fuzzy Network Intrusion Classifier Based on Differential Evolution and Harmonic Search , 2018 .
[30] Adel Bouhoula,et al. Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques , 2012, CISIS/ICEUTE/SOCO Special Sessions.
[31] Kevin Curran,et al. Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments , 2012 .
[32] Nathan S. Netanyahu,et al. DeepSign: Deep learning for automatic malware signature generation and classification , 2015, 2015 International Joint Conference on Neural Networks (IJCNN).
[33] L. M. R. J. Lobo,et al. Use of Genetic Algorithm in Network Security , 2012 .
[34] Matthew C. Valenti,et al. Multibiometric secure system based on deep learning , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[35] Charles C. Willow. A Neural Network-Based Agent Framework for Mail Server Management , 2005, Int. J. Intell. Inf. Technol..
[36] Alexander Pretschner,et al. Automatically assessing vulnerabilities discovered by compositional analysis , 2018, MASES@ASE.
[37] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[38] Michal Choras,et al. Machine Learning Techniques for Cyber Attacks Detection , 2013, IP&C.
[39] Wei Cai,et al. A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.
[40] Dragos Gavrilut,et al. Malware detection using machine learning , 2009, 2009 International Multiconference on Computer Science and Information Technology.
[41] Yi Yi Aung,et al. An Analysis of K-means Algorithm Based Network Intrusion Detection System , 2018 .
[42] Habiba Chaoui,et al. A security approach based on honeypots: Protecting Online Social network from malicious profiles , 2018, ArXiv.
[43] Marcus Gutierrez,et al. Adapting with Honeypot Configurations to Detect Evolving Exploits , 2017, AAMAS.
[44] S. Prabha,et al. Differential Evolution for Mobile Ad-hoc Networks A Review , 2018 .
[45] Karim Faez,et al. A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs , 2018, Future Internet.
[46] Yuansong Qiao,et al. Future Multimedia System: SIP or the Advanced Multimedia System , 2011, Int. J. Ambient Comput. Intell..
[47] Wei Wang,et al. Web Phishing Detection Using a Deep Learning Framework , 2018, Wirel. Commun. Mob. Comput..
[48] Philippe Owezarski,et al. Unsupervised classification and characterization of honeypot attacks , 2014, 10th International Conference on Network and Service Management (CNSM) and Workshop.
[49] Shih-Yuan Wang,et al. Applying the Linguistic Strategy-Oriented Aggregation Approach to Determine the Supplier Performance with Ordinal and Cardinal Data Forms , 2011, Int. J. Fuzzy Syst. Appl..
[50] Thiagarajan Revathi,et al. PSO-based optimal peer selection approach for highly secure and trusted P2P system , 2016, Secur. Commun. Networks.
[51] Bassey Isong,et al. Identification of Compromised Nodes in MANETs using Machine Learning Technique , 2019, International Journal of Computer Network and Information Security.
[52] David C. Yen,et al. A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means , 2015, TMIS.
[53] R Vadivel. PARTICLE SWARM OPTIMIZATION ALGORITHM (PSO) USED FOR SECURITY ENHANCEMENT IN MANET , 2018 .
[54] Farha Haneef. A FEATURE SELECTION TECHNIQUE FOR INTRUSION DETECTION SYSTEM BASED ON IWD AND ACO , 2017 .
[55] Félix J. García Clemente,et al. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.