ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms
IEEE/ACM Transactions on Networking
◽
10.1109/tnet.2021.3137084
◽
2022
◽
pp. 1-18
Author(s):
Chaoyun Zhang
◽
Xavier Costa-Perez
◽
Paul Patras
Keyword(s):
Deep Learning
◽
Intrusion Detection
◽
Defense Mechanisms
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Related Documents
Cited By
References
Effect of Activation Functions on the Performance of Deep Learning Algorithms for Network Intrusion Detection Systems
Proceedings of ICETIT 2019 - Lecture Notes in Electrical Engineering
◽
10.1007/978-3-030-30577-2_84
◽
2019
◽
pp. 949-960
Author(s):
Neha Gupta
◽
Punam Bedi
◽
Vinita Jindal
Keyword(s):
Deep Learning
◽
Intrusion Detection
◽
Learning Algorithms
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Activation Functions
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
A Deep Learning Approach for Anomaly-Based Network Intrusion Detection Systems: A Survey and an Objective Comparison
10.1007/978-3-030-82469-3_20
◽
2021
◽
pp. 227-235
Author(s):
Shailender Kumar
◽
Namrata Jha
◽
Nikhil Sachdeva
Keyword(s):
Deep Learning
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Learning Approach
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems
IEEE Access
◽
10.1109/access.2019.2893871
◽
2019
◽
Vol 7
◽
pp. 13546-13560
◽
Cited By ~ 32
Author(s):
Dimitrios Papamartzivanos
◽
Felix Gomez Marmol
◽
Georgios Kambourakis
Keyword(s):
Deep Learning
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Self Adaptive
Download Full-text
Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems
MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)
◽
10.1109/milcom.2018.8599759
◽
2018
◽
Cited By ~ 10
Author(s):
Kaichen Yang
◽
Jianqing Liu
◽
Chi Zhang
◽
Yuguang Fang
Keyword(s):
Deep Learning
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Adversarial Examples
Download Full-text
RNNIDS: Enhancing network intrusion detection systems through deep learning
Computers & Security
◽
10.1016/j.cose.2020.102151
◽
2021
◽
Vol 102
◽
pp. 102151
Author(s):
Soroush M. Sohi
◽
Jean-Pierre Seifert
◽
Fatemeh Ganji
Keyword(s):
Deep Learning
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
An Approach to Reduce Uncertainty Problem in Network Intrusion Detection Systems
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)
◽
10.1109/iciis51140.2020.9342634
◽
2020
◽
Author(s):
Gargi Kadam
◽
Sahil Parekh
◽
Priyanka Agnihotri
◽
Dayanand Ambawade
◽
Prasenjit Bhavathankar
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Predicting the resource consumption of network intrusion detection systems
Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '08
◽
10.1145/1375457.1375509
◽
2008
◽
Cited By ~ 7
Author(s):
Holger Dreger
◽
Anja Feldmann
◽
Vern Paxson
◽
Robin Sommer
Keyword(s):
Intrusion Detection
◽
Resource Consumption
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
A Flexible Pattern-Matching Algorithm for Network Intrusion Detection Systems Using Multi-Core Processors
Algorithms
◽
10.3390/a10020058
◽
2017
◽
Vol 10
(2)
◽
pp. 58
◽
Cited By ~ 1
Author(s):
◽
Keyword(s):
Intrusion Detection
◽
Pattern Matching
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Matching Algorithm
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Pattern Matching Algorithm
Download Full-text
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
◽
10.1109/nfv-sdn50289.2020.9289869
◽
2020
◽
Author(s):
Mohammad J. Hashemi
◽
Eric Keller
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Adversarial Examples
Download Full-text
On Handling Class Imbalance in Continual Learning based Network Intrusion Detection Systems
10.1145/3486001.3486231
◽
2021
◽
Author(s):
Suresh Kumar Amalapuram
◽
Thushara Tippi Reddy
◽
Sumohana S. Channappayya
◽
Bheemarjuna Reddy Tamma
Keyword(s):
Intrusion Detection
◽
Class Imbalance
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Continual Learning
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close