Related references
Note: Only part of the references are listed.AI-Assisted Security Alert Data Analysis with Imbalanced Learning Methods
Samuel Ndichu et al.
APPLIED SCIENCES-BASEL (2023)
GAN-based anomaly detection: A review
Xuan Xia et al.
NEUROCOMPUTING (2022)
Network Intrusion Detection Model Based on CNN and GRU
Bo Cao et al.
APPLIED SCIENCES-BASEL (2022)
GAN-based imbalanced data intrusion detection system
JooHwa Lee et al.
PERSONAL AND UBIQUITOUS COMPUTING (2021)
A Comprehensive Survey for Machine Learning and Deep Learning Applications for Detecting Intrusion Detection
Ola M. Surakhi et al.
2021 22ND INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT) (2021)
An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset
Vikash Kumar et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)
Sensitivity Analysis for Predicting Sub-Micron Aerosol Concentrations Based on Meteorological Parameters
Martha A. Zaidan et al.
SENSORS (2020)
Intrusion Detection in IoT Networks Using Deep Learning Algorithm
Bambang Susilo et al.
INFORMATION (2020)
GAN-Based Semi-Supervised Learning Approach for Clinical Decision Support in Health-IoT Platform
Yun Yang et al.
IEEE ACCESS (2019)
A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection
Vajiheh Hajisalem et al.
COMPUTER NETWORKS (2018)
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs
Gabriel Macia-Fernandez et al.
COMPUTERS & SECURITY (2018)
A novel statistical technique for intrusion detection systems
Enamul Kabir et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery
Thomas Schlegl et al.
INFORMATION PROCESSING IN MEDICAL IMAGING (IPMI 2017) (2017)
Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network
Christian Ledig et al.
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme
JL Fan et al.
COMPUTER NETWORKS (2004)