1 |
CHANDOLA V, BANERJEE A, KUMAR V. Anomaly detection: A survey. ACM Computing Surveys, 2009, 41 (3): 15.
|
2 |
GARG S, SINGH A, BATRA S, et al. EnClass: Ensemble-based classification model for network anomaly detection in massive datasets [C]// 2017 IEEE Global Communications Conference. IEEE, 2017. DOI: 10.1109/GLOCOM.2017.8255025.
|
3 |
LIMTHONG K, TAWSOOK T. Network traffic anomaly detection using machine learning approaches [C]// Network Operations and Management Symposium. IEEE, 2012: 542-545.
|
4 |
PACHECO F, EXPOSITO E, GINESTE M, et al. Towards the deployment of machine learning solutions in network traffic classification: A aystematic survey. IEEE Communications Surveys and Tutorials, 2019, 21 (2): 1988- 2014.
doi: 10.1109/COMST.2018.2883147
|
5 |
SHEEN S, RAJESH R. Network intrusion detection using feature selection and decision tree classifier [C]// 2008 IEEE Region 10 Conference. IEEE, 2008. DOI: 10.1109/TENCON.2008.4766847.
|
6 |
KUANG F, XU W, ZHANG S. A novel hybrid KPCA and SVM with GA model for intrusion detection. Applied Soft Computing Archive, 2014, (18): 178- 184.
|
7 |
FARNAAZ N, JABBAR M A. Random forest modeling for network intrusion detection system. Procedia Computer Science, 2016, (89): 213- 217.
|
8 |
WU G, ZHAO Z, FU G, et al. A fast kNN-based approach for time sensitive anomaly detection over data streams [C]// International Conference on Computational Science. 2019: 59-74.
|
9 |
GUMUSBAS D, YILDIRIM T, GENOVESE A, et al. A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems. IEEE Systems Journal, 2021, 15 (2): 1717- 1731.
doi: 10.1109/JSYST.2020.2992966
|
10 |
WANG W, ZHU M, WANG J, et al. End-to-end encrypted traffic classification with one-dimensional convolution neural networks [C]// 2017 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2017: 43-48.
|
11 |
NGUYEN T T T, ARMITAGE G. A survey of techniques for internet traffic classification using machine learning [C]// IEEE Communications Surveys and Tutorials. IEEE, 2008: 56-76.
|
12 |
YIN C, ZHU Y, FEI J, et al. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 2017, (5): 21954- 21961.
|
13 |
HOCHREITER S. The vanishing gradient problem during learning recurrent neural nets and problem solutions. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 1998, 6 (2): 107- 116.
doi: 10.1142/S0218488598000094
|
14 |
ZENG Y, GU H, WEI W, et al. Deep-full-range: A deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access, 2019, (7): 45182- 45190.
|
15 |
WANG S, XIA C, WANG T. A novel intrusion detector based on deep learning hybrid methods [C]// 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE, 2019: 300-305.
|
16 |
KIM T, SUH S C, KIM H, et al. An encoding technique for CNN-based network anomaly detection [C]// 2018 IEEE International Conference on Big Data. IEEE, 2018: 2960-2965.
|
17 |
SMAGULOVA K, JAMES A P. A survey on LSTM memristive neural network architectures and applications [J]. The European Physical Journal Special Topics, 2019, 228(10): 2313–2324.
|
18 |
RUI T, ZOU J, ZHOU Y, et al. Convolutional neural network simplification based on feature maps selection [C]// 2016 IEEE 22nd International Conference on Parallel and Distributed Systems. IEEE, 2016: 1207-1210.
|
19 |
SINDAGI V A, PATEL V M. A survey of recent advances in CNN-based single image crowd counting and density estimation. Pattern Recognition Letters, 2018, 107 (1): 3- 16.
|
20 |
VASWANI A, SHAZEER N, PARMAR N, et al. Attention is all you need [C]// Proceedings of the 31st International Conference on Neural Information Processing Systems. 2017: 5998-6008.
|
21 |
WU X, CAI Y, LI Q, et al. Combining contextual information by self-attention mechanism in convolutional neural networks for text classification [C]// International Conference on Web Information Systems Engineering. 2018: 453-467.
|
22 |
CAI N, MA C, WANG W, et al. Effective self-attention modeling for aspect based sentiment analysis [C]// International Conference on Computational Science. 2019: 3-14.
|
23 |
ZHU M, YE K, WANG Y, et al. A deep learning approach for network anomaly detection based on AMF-LSTM [C]// IFIP International Conference on Network and Parallel Computing. 2018: 137-141.
|