Related references
Note: Only part of the references are listed.An optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network
Peng Wei et al.
IEEE ACCESS (2019)
Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection
Liya Su et al.
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)
Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system
Wathiq Laftah Al-Yaseen et al.
EXPERT SYSTEMS WITH APPLICATIONS (2017)
Intrusion Detection using Deep Belief Network and Probabilistic Neural Network
Guangzhen Zhao et al.
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1 (2017)
An efficient algorithm for distributed density-based outlier detection on big data
Mei Bai et al.
NEUROCOMPUTING (2016)
An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks
Ismail Butun et al.
SENSORS (2015)
Outlier Detection for Temporal Data: A Survey
Manish Gupta et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)
Anomaly Detection for Discrete Sequences: A Survey
Varun Chandola et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2012)
A novel intrusion detection system based on hierarchical clustering and support vector machines
Shi-Jinn Horng et al.
EXPERT SYSTEMS WITH APPLICATIONS (2011)
Anomaly detection
Varun Chandola et al.
ACM COMPUTING SURVEYS (2009)
Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector
Feng Chen-Xu et al.
CHINESE PHYSICS LETTERS (2008)
Clustering by passing messages between data points
Brendan J. Frey et al.
SCIENCE (2007)
Discovering cluster-based local outliers
ZY He et al.
PATTERN RECOGNITION LETTERS (2003)