ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Using convolutional neural networks to network intrusion detection for cyber threats
2018 IEEE International Conference on Applied System Invention (ICASI)
◽
10.1109/icasi.2018.8394474
◽
2018
◽
Cited By ~ 11
Author(s):
Wen-Hui Lin
◽
Hsiao-Chung Lin
◽
Ping Wang
◽
Bao-Hua Wu
◽
Jeng-Ying Tsai
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Convolutional Neural Networks
◽
Network Intrusion Detection
◽
Cyber Threats
◽
Network Intrusion
Download Full-text
Related Documents
Cited By
References
Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks
KSII Transactions on Internet and Information Systems
◽
10.3837/tiis.2018.10.028
◽
2018
◽
Vol 12
(10)
◽
Cited By ~ 1
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Convolutional Neural Networks
◽
Network Intrusion Detection
◽
Deep Convolutional Neural Networks
◽
Network Intrusion
Download Full-text
Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detection
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Wireless Internet
◽
10.1007/978-3-030-06158-6_9
◽
2019
◽
pp. 86-94
◽
Cited By ~ 1
Author(s):
Chia-Ming Hsu
◽
He-Yen Hsieh
◽
Setya Widyawan Prakosa
◽
Muhammad Zulfan Azhari
◽
Jenq-Shiou Leu
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Convolutional Neural Networks
◽
Short Term Memory
◽
Network Intrusion Detection
◽
Short Term
◽
Term Memory
◽
Network Intrusion
◽
Long Short Term Memory
Download Full-text
An Introduction to the Use of Neural Networks for Network Intrusion Detection
Computational Intelligence for Privacy and Security - Studies in Computational Intelligence
◽
10.1007/978-3-642-25237-2_2
◽
2012
◽
pp. 5-24
◽
Cited By ~ 3
Author(s):
Christian Bitter
◽
John North
◽
David A. Elizondo
◽
Tim Watson
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Network Intrusion
Download Full-text
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security
2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
◽
10.1109/icccnt.2018.8494096
◽
2018
◽
Cited By ~ 9
Author(s):
Rahul K. Vigneswaran
◽
R. Vinayakumar
◽
K.P. Soman
◽
Prabaharan Poornachandran
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Cyber Security
◽
Deep Neural Networks
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Network Intrusion Detection using Hybrid Neural Networks
2007 International Conference on Signal Processing, Communications and Networking
◽
10.1109/icscn.2007.350665
◽
2007
◽
Cited By ~ 4
Author(s):
P. Ganesh Kumar
◽
D. Devaraj
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Hybrid Neural Networks
Download Full-text
Data preprocessing for non-image data: using convolution neural networks for network intrusion detection systems
10.36334/modsim.2021.m3.glukhov
◽
2021
◽
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Image Data
◽
Data Preprocessing
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Convolution Neural Networks
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Amalgamation of K-means Clustering Algorithm with Standard MLP and SVM Based Neural Networks to Implement Network Intrusion Detection System
Advanced Computing, Networking and Informatics- Volume 2 - Smart Innovation, Systems and Technologies
◽
10.1007/978-3-319-07350-7_31
◽
2014
◽
pp. 273-283
◽
Cited By ~ 3
Author(s):
A. M. Chandrashekhar
◽
K. Raghuveer
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Clustering Algorithm
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Network Intrusion Detection based on Deep Neural Networks for the SCADA system
Journal of Physics Conference Series
◽
10.1088/1742-6596/1585/1/012038
◽
2020
◽
Vol 1585
◽
pp. 012038
Author(s):
Mustafa Altaha
◽
Jae-Myeong Lee
◽
Muhammad Aslam
◽
Sugwon Hong
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Deep Neural Networks
◽
Network Intrusion Detection
◽
Scada System
◽
Network Intrusion
Download Full-text
Improved Seagull Optimization Algorithm to Optimize Neural Networks with Gated Recurrent Units for Network Intrusion Detection
10.1109/idaacs53288.2021.9660898
◽
2021
◽
Author(s):
Sen Ma
◽
Chunzhi Wang
◽
Aijun Liu
◽
Yucheng Zhang
◽
Junfang Wang
◽
...
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Optimization Algorithm
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Gated Recurrent Units
Download Full-text
A network intrusion detection system based on the artificial neural networks
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046324
◽
2004
◽
Cited By ~ 7
Author(s):
Wang Jing-xin
◽
Wang Zhi-ying
◽
Dai Kui
Keyword(s):
Neural Networks
◽
Artificial Neural Networks
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Artificial Neural
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close