Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach
暂无分享,去创建一个
Shahram Jamali | Mahzad Mahdavisharif | Reza Fotohi | S. Jamali | Reza Fotohi | Mahzad Mahdavisharif
[1] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[2] Hao Wang,et al. An intrusion detection method for industrial control systems based on bidirectional simple recurrent unit , 2021, Comput. Electr. Eng..
[3] Reza Fotohi,et al. Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem , 2021, Secur. Priv..
[4] Wei Zhong,et al. Applying big data based deep learning system to intrusion detection , 2020, Big Data Min. Anal..
[5] Jaafar M. H. Elmirghani,et al. Big data analytics for wireless and wired network design: A survey , 2018, Comput. Networks.
[6] Reza Fotohi,et al. Secure Communication between UAVs Using a Method Based on Smart Agents in Unmanned Aerial Vehicles , 2020 .
[7] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[8] Reza Fotohi,et al. A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem , 2020, Int. J. Commun. Syst..
[9] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[10] P. Balasubramanie,et al. Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion Detection , 2017, International Journal of Parallel Programming.
[11] Miguel Correia,et al. A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection , 2017, IWANN.
[12] Reza Fotohi,et al. SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism , 2020, Wirel. Pers. Commun..
[13] Yang Yu,et al. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders , 2017, Secur. Commun. Networks.
[14] Hyuk Lim,et al. Deep Learning Approach for Detecting Malicious Activities Over Encrypted Secure Channels , 2021, IEEE Access.
[15] Ferhat Karataş,et al. Big Data: Controlling Fraud by Using Machine Learning Libraries on Spark , 2018 .
[16] Amaury Lendasse,et al. Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space , 2018, Cognitive Computation.
[17] Nabil Hmina,et al. LSTM deep learning method for network intrusion detection system , 2020 .
[18] Kai Huang,et al. Intrusion Detection Using Convolutional Neural Networks for Representation Learning , 2017, ICONIP.
[19] Guozi Sun,et al. A Residual Learning-Based Network Intrusion Detection System , 2021, Secur. Commun. Networks.
[20] Soumya Ranjan Nayak,et al. A New and Secure Intrusion Detecting System for Detection of Anomalies Within the Big Data , 2019 .
[21] Himansu Das,et al. Classification of Intrusion Detection Using Data Mining Techniques , 2018 .
[22] Farah Jemili,et al. Using MongoDB Databases for Training and Combining Intrusion Detection Datasets , 2017 .
[23] Reza Fotohi,et al. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication , 2020, The Journal of Supercomputing.
[24] Rajkumar L. Biradar,et al. Network intrusion detection using sparse autoencoder with swish-PReLU activation Model , 2021 .
[25] Suad Mohammed Othman,et al. Intrusion detection model using machine learning algorithm on Big Data environment , 2018, Journal of Big Data.
[26] Yi Yang,et al. Big Data Meet Cyber-Physical Systems: A Panoramic Survey , 2018, IEEE Access.