相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Machine Learning Intrusion Detection in Big Data Era: A Multi-Objective Approach for Longer Model Lifespans
Eduardo Viegas et al.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)
A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems
Hanan Hindy et al.
IEEE ACCESS (2020)
Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset
Gozde Karatas et al.
IEEE ACCESS (2020)
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset
Nickolaos Koroniotis et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges
Giuseppe Aceto et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)
A survey of network-based intrusion detection data sets
Markus Ring et al.
COMPUTERS & SECURITY (2019)
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
Hongyu Liu et al.
APPLIED SCIENCES-BASEL (2019)
IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices
Francesca Meneghello et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
Vikas Hassija et al.
IEEE ACCESS (2019)
SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks
Tri Gia Nguyen et al.
IEEE ACCESS (2019)
Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems
Eduardo Viegas et al.
IEEE TRANSACTIONS ON COMPUTERS (2017)
Cyber-Physical Systems Security-A Survey
Abdulmalik Humayed et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
Toward a reliable anomaly-based intrusion detection in real-world environments
Eduardo K. Viegas et al.
COMPUTER NETWORKS (2017)
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Anna L. Buczak et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
Network Anomaly Detection: Methods, Systems and Tools
Monowar H. Bhuyan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
The Matter of Heartbleed
Zakir Durumeric et al.
PROCEEDINGS OF THE 2014 ACM INTERNET MEASUREMENT CONFERENCE (IMC'14) (2014)
Learning from Imbalanced Data
Haibo He et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2009)