ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security
2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
◽
10.1109/icccnt.2018.8494096
◽
2018
◽
Cited By ~ 9
Author(s):
Rahul K. Vigneswaran
◽
R. Vinayakumar
◽
K.P. Soman
◽
Prabaharan Poornachandran
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Cyber Security
◽
Deep Neural Networks
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Related Documents
Cited By
References
Assessing Deep Neural Network and Shallow for Network Intrusion Detection Systems in Cyber Security
10.1007/978-981-16-3728-5_52
◽
2021
◽
pp. 703-713
Author(s):
Deena Babu Mandru
◽
M. Aruna Safali
◽
N. Raghavendra Sai
◽
G. Sai Chaitanya Kumar
Keyword(s):
Neural Network
◽
Intrusion Detection
◽
Cyber Security
◽
Deep Neural Network
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Data preprocessing for non-image data: using convolution neural networks for network intrusion detection systems
10.36334/modsim.2021.m3.glukhov
◽
2021
◽
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Image Data
◽
Data Preprocessing
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Convolution Neural Networks
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Network Intrusion Detection Systems Using Neural Networks
Advances in Intelligent Systems and Computing - Information Systems Design and Intelligent Applications
◽
10.1007/978-981-10-7512-4_89
◽
2018
◽
pp. 903-908
Author(s):
Sireesha Rodda
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
An Approach to Reduce Uncertainty Problem in Network Intrusion Detection Systems
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)
◽
10.1109/iciis51140.2020.9342634
◽
2020
◽
Author(s):
Gargi Kadam
◽
Sahil Parekh
◽
Priyanka Agnihotri
◽
Dayanand Ambawade
◽
Prasenjit Bhavathankar
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Predicting the resource consumption of network intrusion detection systems
Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '08
◽
10.1145/1375457.1375509
◽
2008
◽
Cited By ~ 7
Author(s):
Holger Dreger
◽
Anja Feldmann
◽
Vern Paxson
◽
Robin Sommer
Keyword(s):
Intrusion Detection
◽
Resource Consumption
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
A Flexible Pattern-Matching Algorithm for Network Intrusion Detection Systems Using Multi-Core Processors
Algorithms
◽
10.3390/a10020058
◽
2017
◽
Vol 10
(2)
◽
pp. 58
◽
Cited By ~ 1
Author(s):
◽
Keyword(s):
Intrusion Detection
◽
Pattern Matching
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Matching Algorithm
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Pattern Matching Algorithm
Download Full-text
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
◽
10.1109/nfv-sdn50289.2020.9289869
◽
2020
◽
Author(s):
Mohammad J. Hashemi
◽
Eric Keller
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Adversarial Examples
Download Full-text
On Handling Class Imbalance in Continual Learning based Network Intrusion Detection Systems
10.1145/3486001.3486231
◽
2021
◽
Author(s):
Suresh Kumar Amalapuram
◽
Thushara Tippi Reddy
◽
Sumohana S. Channappayya
◽
Bheemarjuna Reddy Tamma
Keyword(s):
Intrusion Detection
◽
Class Imbalance
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Continual Learning
Download Full-text
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
IEEE Journal on Selected Areas in Communications
◽
10.1109/jsac.2006.877131
◽
2006
◽
Vol 24
(10)
◽
pp. 1781-1792
◽
Cited By ~ 99
Author(s):
S. Dharmapurikar
◽
J.W. Lockwood
Keyword(s):
Intrusion Detection
◽
Pattern Matching
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Effect of Activation Functions on the Performance of Deep Learning Algorithms for Network Intrusion Detection Systems
Proceedings of ICETIT 2019 - Lecture Notes in Electrical Engineering
◽
10.1007/978-3-030-30577-2_84
◽
2019
◽
pp. 949-960
Author(s):
Neha Gupta
◽
Punam Bedi
◽
Vinita Jindal
Keyword(s):
Deep Learning
◽
Intrusion Detection
◽
Learning Algorithms
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Activation Functions
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close