4.5 Article

An Efficient Intrusion Detection Method Based on LightGBM and Autoencoder

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Deep packet: a novel approach for encrypted traffic classification using deep learning

Mohammad Lotfollahi et al.

SOFT COMPUTING (2020)

Article Computer Science, Artificial Intelligence

A novel statistical analysis and autoencoder driven intelligent intrusion detection approach

Cosimo Ieracitano et al.

NEUROCOMPUTING (2020)

Article Computer Science, Interdisciplinary Applications

Deep recurrent neural network for IoT intrusion detection system

Muder Almiani et al.

SIMULATION MODELLING PRACTICE AND THEORY (2020)

Article Computer Science, Artificial Intelligence

Dynamic dispatching system using a deep denoising autoencoder for semiconductor manufacturing

Sangmin Lee et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Artificial Intelligence

An efficient XGBoost-DNN-based classification model for network intrusion detection system

Preethi Devan et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Information Systems

A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU

Sweta Bhattacharya et al.

ELECTRONICS (2020)

Article Multidisciplinary Sciences

Effects of Machine Learning Approach in Flow-Based Anomaly Detection on Software-Defined Networking

Samrat Kumar Dey et al.

SYMMETRY-BASEL (2020)

Article Chemistry, Multidisciplinary

A New Method of Fuzzy Support Vector Machine Algorithm for Intrusion Detection

Wei Liu et al.

APPLIED SCIENCES-BASEL (2020)

Article Environmental Sciences

Semi-Supervised Text Classification Framework: An Overview of Dengue Landscape Factors and Satellite Earth Observation

Zhichao Li et al.

INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH (2020)

Article Computer Science, Artificial Intelligence

Biologically Inspired Visual System Architecture for Object Recognition in Autonomous Systems

Dan Malowany et al.

ALGORITHMS (2020)

Article Computer Science, Theory & Methods

A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework

Congyuan Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

Anomaly-Based Intrusion Detection From Network Flow Features Using Variational Autoencoder

Sultan Zavrak et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Outlier Detection for Monitoring Data Using Stacked Autoencoder

Fangyi Wan et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

MPCA SGD-A Method for Distributed Training of Deep Learning Models on Spark

Matthias Langer et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2018)

Article Computer Science, Information Systems

Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection

Majjed Al-Qatf et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Multilayered Echo-State Machine: A Novel Architecture for Efficient Intrusion Detection

Taha Ait Tchakoucht et al.

IEEE ACCESS (2018)

Article Computer Science, Artificial Intelligence

Logistic regression in large rare events and imbalanced data: A performance comparison of prior correction and weighting methods

Maher Maalouf et al.

COMPUTATIONAL INTELLIGENCE (2018)

Article Computer Science, Information Systems

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

Chuanlong Yin et al.

IEEE ACCESS (2017)

Review Computer Science, Hardware & Architecture

A survey of network anomaly detection techniques

Mohiuddin Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Information Systems

Flow-Based Anomaly Intrusion Detection System Using Two Neural Network Stages

Yousef Abuadlla et al.

COMPUTER SCIENCE AND INFORMATION SYSTEMS (2014)

Article Multidisciplinary Sciences

Reducing the dimensionality of data with neural networks

G. E. Hinton et al.

SCIENCE (2006)