Related references
Note: Only part of the references are listed.A novel SVM-kNN-PSO ensemble method for intrusion detection system
Abdulla Amin Aburomman et al.
APPLIED SOFT COMPUTING (2016)
Transfer learning for short-term wind speed prediction with deep neural networks
Qinghua Hu et al.
RENEWABLE ENERGY (2016)
Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security
Min-Joo Kang et al.
PLOS ONE (2016)
A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks
Kelton A. P. Costa et al.
INFORMATION SCIENCES (2015)
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
Wei-Chao Lin et al.
KNOWLEDGE-BASED SYSTEMS (2015)
Deep learning in neural networks: An overview
Juergen Schmidhuber
NEURAL NETWORKS (2015)
A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks
Amin Karami et al.
NEUROCOMPUTING (2015)
Representation Learning: A Review and New Perspectives
Yoshua Bengio et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2013)
Network anomaly detection with the restricted Boltzmann machine
Ugo Fiore et al.
NEUROCOMPUTING (2013)
A network intrusion detection system based on a Hidden Naive Bayes multiclass classifier
Levent Koc et al.
EXPERT SYSTEMS WITH APPLICATIONS (2012)
Deep Neural Networks for Acoustic Modeling in Speech Recognition
Geoffrey Hinton et al.
IEEE SIGNAL PROCESSING MAGAZINE (2012)
Context-Dependent Pre-Trained Deep Neural Networks for Large-Vocabulary Speech Recognition
George E. Dahl et al.
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING (2012)
Incremental SVM based on reserved set for network intrusion detection
Yang Yi et al.
EXPERT SYSTEMS WITH APPLICATIONS (2011)
Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System
Meikang Qiu et al.
IEEE TRANSACTIONS ON SMART GRID (2011)
A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
Gang Wang et al.
EXPERT SYSTEMS WITH APPLICATIONS (2010)
Intrusion detection by machine learning: A review
Chih-Fong Tsai et al.
EXPERT SYSTEMS WITH APPLICATIONS (2009)
Random-forests-based network intrusion detection systems
Jiong Zhang et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2008)
A tutorial on spectral clustering
Ulrike von Luxburg
STATISTICS AND COMPUTING (2007)
A hierarchical SOM-based intrusion detection system
H. Gunes Kayacik et al.
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2007)
Reducing the dimensionality of data with neural networks
G. E. Hinton et al.
SCIENCE (2006)
A fast learning algorithm for deep belief nets
Geoffrey E. Hinton et al.
NEURAL COMPUTATION (2006)
An introduction to ROC analysis
Tom Fawcett
PATTERN RECOGNITION LETTERS (2006)
Network security basics
GA Marin
IEEE SECURITY & PRIVACY (2005)
Application of SVM and ANN for intrusion detection
WH Chen et al.
COMPUTERS & OPERATIONS RESEARCH (2005)
Intrusion detection techniques for mobile wireless networks
YG Zhang et al.
WIRELESS NETWORKS (2003)
Network intrusion and fault detection: A statistical anomaly approach
C Manikopoulos et al.
IEEE COMMUNICATIONS MAGAZINE (2002)
Normalized cuts and image segmentation
JB Shi et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2000)