4.6 Article

LAN Intrusion Detection Using Convolutional Neural Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system

Neha Gupta et al.

Summary: This paper introduces LIO-IDS, a network-based intrusion detection system utilizing Long Short-Term Memory (LSTM) classifiers and Improved One-vs-One techniques to effectively handle frequent and infrequent network intrusions, showing significant performance improvement compared to existing systems.

COMPUTER NETWORKS (2021)

Proceedings Paper Computer Science, Interdisciplinary Applications

A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid

Zakaria El Mrabet et al.

2019 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT) (2019)

Article Computer Science, Information Systems

Deep Learning Approach for Intelligent Intrusion Detection System

R. Vinayakumar et al.

IEEE ACCESS (2019)

Review Information Science & Library Science

Real-time big data processing for anomaly detection: A Survey

Riyaz Ahamed Ariyaluran Habeeb et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2019)

Article Computer Science, Artificial Intelligence

A systematic study of the class imbalance problem in convolutional neural networks

Mateusz Buda et al.

NEURAL NETWORKS (2018)

Proceedings Paper Computer Science, Theory & Methods

A High-Performance Intrusion Detection Method Based on Combining Supervised and Unsupervised Learning

Hanwen Wang et al.

2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI) (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques

Mohamed Idhammad et al.

PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017) (2018)

Review Computer Science, Hardware & Architecture

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

Salman Iqbal et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods

Mahbod Tavallaee et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2010)