Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
Top Cited Papers
- 24 December 2019
- journal article
- research article
- Published by Elsevier BV in Journal of Information Security and Applications
- Vol. 50, 102419
- https://doi.org/10.1016/j.jisa.2019.102419
Abstract
No abstract availableKeywords
This publication has 76 references indexed in Scilit:
- An empirical comparison of botnet detection methodsComputers & Security, 2014
- Fusion of Smartphone Motion Sensors for Physical Activity RecognitionSensors, 2014
- Deep Learning: Methods and ApplicationsFoundations and Trends® in Signal Processing, 2014
- Network anomaly detection with the restricted Boltzmann machineNeurocomputing, 2013
- A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call PatternsInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2013
- Toward developing a systematic approach to generate benchmark datasets for intrusion detectionComputers & Security, 2012
- A control system testbed to validate critical infrastructure protection conceptsInternational Journal of Critical Infrastructure Protection, 2011
- Deep belief networksScholarpedia, 2009
- Harnessing Nonlinearity: Predicting Chaotic Systems and Saving Energy in Wireless CommunicationScience, 2004
- Serial Order: A Parallel Distributed Processing ApproachPublished by Elsevier BV ,1997