Related references
Note: Only part of the references are listed.Intelligent Hybrid Model to Enhance Time Series Models for Predicting Network Traffic
Theyazn H. H. Aldhyani et al.
IEEE ACCESS (2020)
Context-aware rule learning from smartphone data: survey, challenges and future directions
Iqbal H. Sarker
JOURNAL OF BIG DATA (2019)
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage
Iqbal H. Sarker et al.
JOURNAL OF BIG DATA (2019)
Network Intrusion Detection: Based on Deep Hierarchical Network and original Flow Data
Yong Zhang et al.
IEEE ACCESS (2019)
Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network
Ying Zhang et al.
IEEE ACCESS (2019)
Evaluating deep learning approaches to characterize and classify malicious URL's
R. Vinayakumar et al.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2018)
Evaluating deep learning approaches to characterize and classify the DGAs at scale
R. Vinayakumar et al.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2018)
Detecting malicious domain names using deep learning approaches at scale
R. Vinayakumar et al.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2018)
Machine Learning and Deep Learning Methods for Cybersecurity
Yang Xin et al.
IEEE ACCESS (2018)
An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection
Tamer Aldwairi et al.
COMPUTER NETWORKS (2018)
A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection
Zhaohui Zhang et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders
Yang Yu et al.
SECURITY AND COMMUNICATION NETWORKS (2017)
A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
Chuanlong Yin et al.
IEEE ACCESS (2017)
Intrusion Detection using Deep Belief Network and Probabilistic Neural Network
Guangzhen Zhao et al.
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1 (2017)
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Anna L. Buczak et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices
Aleksandar Milenkoski et al.
ACM COMPUTING SURVEYS (2015)
Network anomaly detection with the restricted Boltzmann machine
Ugo Fiore et al.
NEUROCOMPUTING (2013)
An efficient intrusion detection system based on support vector machines and gradually feature removal method
Yinhui Li et al.
EXPERT SYSTEMS WITH APPLICATIONS (2012)
Mutual information-based feature selection for intrusion detection systems
Fatemeh Amiri et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
An Overview of IP Flow-Based Intrusion Detection
Anna Sperotto et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)
Anomaly-based network intrusion detection: Techniques, systems and challenges
P. Garcia-Teodoro et al.
COMPUTERS & SECURITY (2009)
A Survey of Techniques for Internet Traffic Classification using Machine Learning
Thuy T. T. Nguyen et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)