4.4 Article Proceedings Paper

Study of long short-term memory in flow-based network intrusion detection system

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

LSTM: A Search Space Odyssey

Klaus Greff et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2017)

Article Computer Science, Information Systems

Flow-based intrusion detection: Techniques and challenges

Muhammad Fahad Umer et al.

COMPUTERS & SECURITY (2017)

Review Computer Science, Hardware & Architecture

A survey of network anomaly detection techniques

Mohiuddin Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Review Multidisciplinary Sciences

Deep learning

Yann LeCun et al.

NATURE (2015)

Article Computer Science, Information Systems

An empirical comparison of botnet detection methods

S. Garcia et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Information Systems

Network Anomaly Detection: Methods, Systems and Tools

Monowar H. Bhuyan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Review Computer Science, Hardware & Architecture

A survey of network flow applications

Bingdong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Hardware & Architecture

Automatic network intrusion detection: Current techniques and open issues

Carlos A. Catania et al.

COMPUTERS & ELECTRICAL ENGINEERING (2012)

Article Computer Science, Information Systems

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Artificial Intelligence

Intrusion detection using reduced-size RNN based on feature grouping

Mansour Sheikhan et al.

NEURAL COMPUTING & APPLICATIONS (2012)

Article Computer Science, Information Systems

An Overview of IP Flow-Based Intrusion Detection

Anna Sperotto et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)

Article Computer Science, Artificial Intelligence

A fast learning algorithm for deep belief nets

Geoffrey E. Hinton et al.

NEURAL COMPUTATION (2006)

Article Computer Science, Hardware & Architecture

The 1999 DARPA off-line intrusion detection evaluation

R Lippmann et al.

COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING (2000)

Article Computer Science, Artificial Intelligence

Learning to forget: Continual prediction with LSTM

FA Gers et al.

NEURAL COMPUTATION (2000)