ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks
2016 14th Annual Conference on Privacy, Security and Trust (PST)
◽
10.1109/pst.2016.7906980
◽
2016
◽
Cited By ~ 11
Author(s):
Carlos Garcia Cordero
◽
Sascha Hauke
◽
Max Muhlhauser
◽
Mathias Fischer
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Anomaly Intrusion Detection
Download Full-text
Related Documents
Cited By
References
Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks
10th IEEE Symposium on Computers and Communications (ISCC'05)
◽
10.1109/iscc.2005.33
◽
2005
◽
Author(s):
ByungRae Cha
◽
B. Vaidya
◽
Seungjo Han
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
System Call
◽
Anomaly Intrusion Detection
Download Full-text
High‐performance anomaly intrusion detection system with ensemble neural networks on reconfigurable hardware
Concurrency and Computation Practice and Experience
◽
10.1002/cpe.6370
◽
2021
◽
Author(s):
Tran Ngoc Thinh
◽
Tran Hoang Quoc Bao
◽
Duc‐Minh Ngo
◽
Cuong Pham‐Quoc
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Intrusion Detection System
◽
High Performance
◽
Detection System
◽
Reconfigurable Hardware
◽
Performance Anomaly
◽
Ensemble Neural Networks
◽
Anomaly Intrusion Detection
Download Full-text
Anomaly Intrusion Detection using Fuzzy Membership Function and Neural Networks
The KIPS Transactions PartC
◽
10.3745/kipstc.2004.11c.5.595
◽
2004
◽
Vol 11C
(5)
◽
pp. 595-604
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Membership Function
◽
Fuzzy Membership
◽
Fuzzy Membership Function
◽
Anomaly Intrusion Detection
Download Full-text
An Anomaly Intrusion Detection Approach Using Cellular Neural Networks
Computer and Information Sciences – ISCIS 2006 - Lecture Notes in Computer Science
◽
10.1007/11902140_94
◽
2006
◽
pp. 908-917
◽
Cited By ~ 2
Author(s):
Zhongxue Yang
◽
Adem Karahoca
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Cellular Neural Networks
◽
Detection Approach
◽
Anomaly Intrusion Detection
Download Full-text
Using Fuzzy Neural Networks and rule heuristics for anomaly intrusion detection on database connection
2008 International Conference on Machine Learning and Cybernetics
◽
10.1109/icmlc.2008.4621030
◽
2008
◽
Cited By ~ 1
Author(s):
Rung-Ching Chen
◽
Kai-Fang Cheng
◽
Cheng-Chia Hsieh
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Fuzzy Neural Networks
◽
Fuzzy Neural
◽
Anomaly Intrusion Detection
Download Full-text
Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection
30th Annual International Computer Software and Applications Conference (COMPSAC'06)
◽
10.1109/compsac.2006.40
◽
2006
◽
Cited By ~ 11
Author(s):
Mohammad Al-Subaie
◽
Mohammad Zulkernine
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Hidden Markov Models
◽
Markov Models
◽
Hidden Markov
◽
Anomaly Intrusion Detection
Download Full-text
An overview of neural networks use in anomaly Intrusion Detection Systems
2009 IEEE Student Conference on Research and Development (SCOReD)
◽
10.1109/scored.2009.5443289
◽
2009
◽
Cited By ~ 6
Author(s):
Yusuf Sani
◽
Ahmed Mohamedou
◽
Khalid Ali
◽
Anahita Farjamfar
◽
Mohamed Azman
◽
...
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Anomaly Intrusion Detection
Download Full-text
APPLYING OF NEURAL NETWORKS IN INTRUSION DETECTION SYSTEMS
PROCESSING, TRANSMISSION AND PROTECTION OF INFORMATION IN COMPUTER SYSTEMS
◽
10.31799/978-5-8088-1452-3-2020-1-197-202
◽
2020
◽
Author(s):
I. D. Popov
◽
◽
V. V. Komashinsky
◽
M. N. Isaeva
◽
◽
...
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
Anomaly intrusion detection based on genetic optimization and fuzzy rules mining
Journal of Computer Applications
◽
10.3724/sp.j.1087.2009.02227
◽
2009
◽
Vol 29
(8)
◽
pp. 2227-2229
Author(s):
Dong-sheng XU
◽
Xiao-yan AI
◽
Shi-liang YAN
Keyword(s):
Intrusion Detection
◽
Fuzzy Rules
◽
Genetic Optimization
◽
Anomaly Intrusion Detection
Download Full-text
The Influence of Salp Swarm Algorithm-Based Feature Selection on Network Anomaly Intrusion Detection
IEEE Access
◽
10.1109/access.2021.3102095
◽
2021
◽
pp. 1-1
Author(s):
Alanoud Alsaleh
◽
Wojdan Binsaeedan
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Salp Swarm Algorithm
◽
Swarm Algorithm
◽
Anomaly Intrusion Detection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close