-
2
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
Depren, Ozgur, et al., An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks, Expert systems with Applications 29.4, pp.713-722, 2005
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
-
3
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
Liao, Yihua, and V. Rao Vemuri, Use of k-nearest neighbor classifier for intrusion detection, Computers & Security 21.5, pp.439-448, 2002
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Rao Vemuri, V.2
-
4
-
-
84943383590
-
Identifying important features for intrusion detection using support vector machines and neural networks
-
Sung, Andrew H., Srinivas Mukkamala, Identifying important features for intrusion detection using support vector machines and neural networks, Applications and the Internet, 2003
-
(2003)
Applications and the Internet
-
-
Sung, A.H.1
Mukkamala, S.2
-
5
-
-
1642355954
-
Application of machine learning algorithms to kdd intrusion detection dataset within misuse detection context
-
Sabhnani, Maheshkumar, and Grsel Serpen., Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context, MLMTA, 2003
-
(2003)
MLMTA
-
-
Sabhnani, M.1
Serpen, G.2
-
6
-
-
0031573117
-
Long Short-Term memory
-
Hochreiter, Sepp, and Jrgen Schmidhuber, Long short-term memory, Neural computation 9.8, pp.1735-1780, 1997
-
(1997)
Neural Computation
, vol.9
, Issue.8
, pp. 1735-1780
-
-
Hochreiter, S.1
Schmidhuber, J.2
-
7
-
-
68649088777
-
Reservoir computing approaches to recurrent neural network training
-
LukoEviIus, Mantas, and Herbert Jaeger, Reservoir computing approaches to recurrent neural network training, Computer Science Review 3.3 pp.127-149, 2009
-
(2009)
Computer Science Review
, vol.3
, Issue.3
, pp. 127-149
-
-
Luko, E.1
Mantas, I.2
Jaeger, H.3
-
8
-
-
84968662652
-
A hybrid machine learning approach to network anomaly detection
-
S. Taeshik, M. Jongsub, A hybrid machine learning approach to network anomaly detection, ScienceDirect, Information Sciences 177, pp.37993821, 2007
-
(2007)
ScienceDirect, Information Sciences
, vol.177
, pp. 37993821
-
-
Taeshik, S.1
Jongsub, M.2
-
9
-
-
33947581868
-
Hybrid flexible neural-tree-based intrusion detection systems
-
April
-
C. Yehui, A. Ajith, Y. Bo, Hybrid flexible neural-tree-based intrusion detection systems, International Journal of Intelligent Systems, Volume 22 Issues 4, pp.337-352, April 2007
-
(2007)
International Journal of Intelligent Systems
, vol.22
, Issue.4
, pp. 337-352
-
-
Yehui, C.1
Ajith, A.2
Bo, Y.3
-
10
-
-
33947251166
-
A hierarchical SOM-based intrusion detection system
-
H. Kayacik, A. Zincir-Heywood, and M. Heywood, A hierarchical SOM-based intrusion detection system, In Proc. Elsevier Engineering Application of Artificial Intelligence, pp.439-451, 2007
-
(2007)
Proc Elsevier Engineering Application of Artificial Intelligence
, pp. 439-451
-
-
Kayacik, H.1
Zincir-Heywood, A.2
Heywood, M.3
-
12
-
-
24044475779
-
-
Springer Berlin Heidelberg
-
Mukkamala, Srinivas, Andrew H. Sung, and Ajith Abraham, Intrusion detection using ensemble of soft computing paradigms, Intelligent Systems Design and Applications. Springer Berlin Heidelberg, pp.239-248, 2003
-
(2003)
Intrusion Detection Using Ensemble of Soft Computing Paradigms, Intelligent Systems Design and Applications
, pp. 239-248
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
13
-
-
6344228475
-
Recurrent network in network intrusion detection system
-
Aug
-
J.-S. Xue, J.-Z. Sun, and X. Zhang, Recurrent network in network intrusion detection system, In Machine Learning and Cybernetics, Proceedings of 2004 International Conference on, vol. 5, pp.26762679, Aug 2004
-
(2004)
Machine Learning and Cybernetics, Proceedings of 2004 International Conference on
, vol.5
, pp. 26762679
-
-
Xue, J.-S.1
Sun, J.-Z.2
Zhang, X.3
-
15
-
-
84968531618
-
Applying recurrent neural network to intrusion detection with hessian free optimization
-
K. Jihyun, K. Howon, Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization, In Proc. WISA, 2015
-
(2015)
Proc. WISA
-
-
Jihyun, K.1
Howon, K.2
-
16
-
-
0025503558
-
Backpropagation through Time: What it does and how to do it
-
Werbos, Paul J., Backpropagation through time: what it does and how to do it, Proceedings of the IEEE 78.10, pp.1550-1560, 1990
-
(1990)
Proceedings of the IEEE
, vol.78
, Issue.10
, pp. 1550-1560
-
-
Werbos Paul, J.1
-
17
-
-
0028392483
-
Learning Long-Term dependencies with gradient descent is difficult, Neural Networks
-
Bengio, Yoshua, S. Patrice, and F.Paolo, Learning long-term dependencies with gradient descent is difficult, Neural Networks, IEEE Transactions on 5.2, pp.157-166, 1994
-
(1994)
IEEE Transactions on
, vol.5
, Issue.2
, pp. 157-166
-
-
Yoshua, B.1
Patrice, S.2
Paolo, F.3
-
19
-
-
84941131871
-
Performance comparison for intrusion detection system using neural network with KDD dataset
-
Devaraju, S., S. Ramakrishnan, Performance comparison for intrusion detection system using neural network with KDD dataset, ICTACT Journal on Soft Computing. l 4.3, 2014
-
(2014)
ICTACT Journal on Soft Computing
, vol.14
, pp. 3
-
-
Devaraju, S.1
Ramakrishnan, S.2
-
20
-
-
84968584771
-
Intrusion detection with KNN classification and DS-theory
-
Deepika, D., V. Richhariya, Intrusion detection with KNN classification and DS-theory, International Journal of Computer Science and Information Technology and Security 2.2, pp.274-281, 2012
-
(2012)
International Journal of Computer Science and Information Technology and Security
, vol.2
, Issue.2
, pp. 274-281
-
-
Deepika, D.1
Richhariya, V.2
-
21
-
-
84940211653
-
Improved intrusion detection system using c4.5 decision tree and support vector machine
-
Vaishali Kosamkar, and Sangita S Chaudhari, Improved Intrusion Detection System using C4.5 Decision Tree and Support Vector Machine, International Journal of Computer Science and Information Technologies Vol.5(2), pp.1463-1467, 2014
-
(2014)
International Journal of Computer Science and Information Technologies Vol.
, vol.5
, Issue.2
, pp. 1463-1467
-
-
Kosamkar, V.1
Chaudhari, S.S.2
|