Related references
Note: Only part of the references are listed.A deep learning based HTTP slow DoS classification approach using flow data
N. Muraleedharan et al.
ICT EXPRESS (2021)
Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks Within Industrial Internet of Things
Vladimir Borgiani et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Toward Effective Intrusion Detection Using Log-Cosh Conditional Variational Autoencoder
Xing Xu et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Multiple Attacks Detection in Cyber-Physical Systems Using Random Finite Set Theory
Chaoqun Yang et al.
IEEE TRANSACTIONS ON CYBERNETICS (2020)
Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing
Danni Yuan et al.
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) (2020)
Anomaly-Based Intrusion Detection From Network Flow Features Using Variational Autoencoder
Sultan Zavrak et al.
IEEE ACCESS (2020)
Audio-Visual Speech Enhancement Using Conditional Variational Auto-Encoders
Mostafa Sadeghi et al.
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING (2020)
Learning Neural Representations for Network Anomaly Detection
Van Loi Cao et al.
IEEE TRANSACTIONS ON CYBERNETICS (2019)
DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications
Amit Praseed et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks
Saurabh Dey et al.
INFORMATION FUSION (2019)
Denoising Adversarial Autoencoders
Antonia Creswell et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2019)
ACVAE-VC: Non-Parallel Voice Conversion With Auxiliary Classifier Variational Autoencoder
Hirokazu Katneoka et al.
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING (2019)
Deep Learning Approach for Intelligent Intrusion Detection System
R. Vinayakumar et al.
IEEE ACCESS (2019)
Cost-Sensitive Learning of Deep Feature Representations From Imbalanced Data
Salman H. Khan et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2018)
An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities
Amin Karami
EXPERT SYSTEMS WITH APPLICATIONS (2018)
Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach
Khoi Khac Nguyen et al.
2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC) (2018)
Intrusion detection techniques in cloud environment: A survey
Preeti Mishra et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
PSO-based method for SVM classification on skewed data sets
Jair Cervantes et al.
NEUROCOMPUTING (2017)
Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN
N. Pandeeswari et al.
MOBILE NETWORKS & APPLICATIONS (2016)
Detecting Denial of Service Attacks in the Cloud
Raneel Kumar et al.
2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC (2016)
Security and Privacy-Enhancing Multicloud Architectures
Jens-Matthias Bohli et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2013)
Exploratory Undersampling for Class-Imbalance Learning
Xu-Ying Liu et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS (2009)