相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。LSTM: A Search Space Odyssey
Klaus Greff et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2017)
Flow-based intrusion detection: Techniques and challenges
Muhammad Fahad Umer et al.
COMPUTERS & SECURITY (2017)
A survey of network anomaly detection techniques
Mohiuddin Ahmed et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
An empirical comparison of botnet detection methods
S. Garcia et al.
COMPUTERS & SECURITY (2014)
Network Anomaly Detection: Methods, Systems and Tools
Monowar H. Bhuyan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
A survey of network flow applications
Bingdong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
Automatic network intrusion detection: Current techniques and open issues
Carlos A. Catania et al.
COMPUTERS & ELECTRICAL ENGINEERING (2012)
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
Ali Shiravi et al.
COMPUTERS & SECURITY (2012)
Intrusion detection using reduced-size RNN based on feature grouping
Mansour Sheikhan et al.
NEURAL COMPUTING & APPLICATIONS (2012)
An Overview of IP Flow-Based Intrusion Detection
Anna Sperotto et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)
A fast learning algorithm for deep belief nets
Geoffrey E. Hinton et al.
NEURAL COMPUTATION (2006)
The 1999 DARPA off-line intrusion detection evaluation
R Lippmann et al.
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING (2000)
Learning to forget: Continual prediction with LSTM
FA Gers et al.
NEURAL COMPUTATION (2000)