4.7 Article

Network traffic analysis over clustering-based collective anomaly detection

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

An optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network

Peng Wei et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection

Liya Su et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Article Computer Science, Artificial Intelligence

Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system

Wathiq Laftah Al-Yaseen et al.

EXPERT SYSTEMS WITH APPLICATIONS (2017)

Proceedings Paper Computer Science, Theory & Methods

Intrusion Detection using Deep Belief Network and Probabilistic Neural Network

Guangzhen Zhao et al.

2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1 (2017)

Article Computer Science, Artificial Intelligence

An efficient algorithm for distributed density-based outlier detection on big data

Mei Bai et al.

NEUROCOMPUTING (2016)

Article Computer Science, Artificial Intelligence

Outlier Detection for Temporal Data: A Survey

Manish Gupta et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)

Article Computer Science, Artificial Intelligence

Anomaly Detection for Discrete Sequences: A Survey

Varun Chandola et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2012)

Article Computer Science, Artificial Intelligence

A novel intrusion detection system based on hierarchical clustering and support vector machines

Shi-Jinn Horng et al.

EXPERT SYSTEMS WITH APPLICATIONS (2011)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)

Article Physics, Multidisciplinary

Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector

Feng Chen-Xu et al.

CHINESE PHYSICS LETTERS (2008)

Article Multidisciplinary Sciences

Clustering by passing messages between data points

Brendan J. Frey et al.

SCIENCE (2007)

Article Computer Science, Artificial Intelligence

Discovering cluster-based local outliers

ZY He et al.

PATTERN RECOGNITION LETTERS (2003)