|
[1]DIGITAL 2019: GLOBAL DIGITAL YEARBOOK, https://datareportal.com/reports/digital-2019-global-digital-yearbook, 2020 [2]CSISO網路安全報告, https://www.cisco.com/c/zh_tw/products/security/security-reports.html, 2020 [3]H. Shin , H. R. Roth, M. Gao, L. Lu, Z. Xu, I. Nogues, J. Yao, D. Mollura and R. M. Summers, “Deep Convolutional Neural Networks for Computer-Aided Detection: CNN Architectures, Dataset Characteristics and Transfer Learning,’’ IEEE Transactions on Medical Imaging, vol. 35, no. 5, pp. 1285-1298, 2016 [4]Y. Tian, K. Pei, S. Jana and B. Ray, “DeepTest: Automated Testing of Deep-Neural-Network-Driven Autonomous Cars,’’ IEEE/ACM 40th International Conference on Software Engineering (ICSE), pp. 303-314, 2018 [5]H. Yao, D. Fu, P. Zhang, M. Li and Y. Liu, “MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System,’’ IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1949-1959, 2019 [6]R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat and S. Venkatraman, “Deep Learning Approach for Intelligent Intrusion Detection System,” IEEE Access, vol. 7, pp. 41525-41550, 2019 [7]C. Yin, Y. Zhu, J. Fei and X. He, “A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks,’’ IEEE Access, vol. 5, pp. 21954-21961, 2017 [8]A. Torkaman, G. Javadzadeh, and M. Bahrololum, “A Hybrid Intelligent HIDS Model Using Two-layer Genetic Algorithm and Neural Network,’’ IEEE Conference on Information and Knowledge Technology, pp. 92–96, 2013 [9]R. Puzis, M. D. Klippel, Y. Elovici, and S. Dolev, “Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures,’’ IEEE International Conference on Intelligence and Security Informatics, pp. 191–203, 2008 [10]Y. LeCun, Y. Bengio and G. Hinton, “Deep Learning,’’ Nature, vol. 521, pp. 436–444, 2015 [11]C.Cortes and V.Vapnik, “Support-vector Networks,” Machine Learning, vol. 20, pp. 273–297, 1995 [12]A. Krizhevsky, I. Sutskever and G. Hinton, “ImageNet Classification with Deep Convolutional Neural Networks,” Neural Information Processing Systems, vol. 25, 2012 [13]S. Chen, H. Wang, F. Xu and Y. Jin, “Target Classification Using the Deep Convolutional Networks for SAR Images,” IEEE Transactions on Geoscience and Remote Sensing, vol. 54, no. 8, pp. 4806-4817, 2016 [14]Y. Xu, J. Du, L. Dai and C. Lee, “A Regression Approach to Speech Enhancement Based on Deep Neural Networks,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 1, pp. 7-19, 2015 [15]M. Olazaran, “A Sociological Study of the Official History of the Perceptron Controversy,” Social Studies of Science, vol. 26, pp. 611–659, 1996 [16]J. Han and C. Moraga, “The Influence of The Sigmoid Function Parameters on The Speed of Backpropagation Learning,” International Work-Conference on Artificial Neural Networks, pp. 195-201, 1995 [17]J. F. Kolen and S. C. Kremer, A Field Guide to Dynamical Recurrent Networks, New York, NY, USA: John Wiley & Sons, pp.237-243, 2001 [18]V. Nair and G. Hinton, “Rectified Linear Units Improve Restricted Boltzmann Machines,” International Conference on Machine Learning, pp. 807-814, 2010 [19]D. Rumelhart, G. Hinton and R. Williams, “Learning Representations by Back-propagating Errors,” Nature, vol. 323, pp. 533–536, 1986. [20]KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html [21]M. Tavallaee, E. Bagheri, W. Lu and A. A. Ghorbani, “A Detailed Analysis of The KDD CUP 99 Data Set,” IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1-6, 2009 [22]G. Mantas, N. Stakhanova, H. Gonzalez, H. H. Jazi, and A. A. Ghorbani, “Application-layer Denial of Service Attacks: Taxonomy and Survey,” International Journal of Information and Computer Security, vol. 7, pp. 216–239, 2015 [23]E. Bou-Harb, M. Debbabi, and C. Assi, “Cyber Scanning: A Comprehensive Survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1496–1519, 2014. [24]KDD Cup 1999 Task Description, http://kdd.ics.uci.edu/databases/kddcup99/task.html [25]E. Kreyszig, Advanced Engineering Mathematics(Fourth ed.), New York, NY, USA: John Wiley & Sons, pp. 880, 2009 [26]W. Wang, M. Zhu, J. Wang, X. Zeng and Z. Yang, “End-to-end Encrypted Traffic Classification with One-dimensional Convolution Neural Networks,” IEEE International Conference on Intelligence and Security Informatics, pp. 43-48, 2017 [27]S. Hochreiter and J. Schmidhuber, “Long Short-term Memory,” Neural Computation, vol. 9, pp. 1735–1780, 1997. [28]Y. LeCun, B. Boser, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard and L. D. Jackel, “Backpropagation Applied to Handwritten Zip Code Recognition,” Neural Computation, vol. 1, no. 4, pp. 541-551, 1989 [29]R. Geirhos, D. H. J. Janssen, H. H. Schütt, J. Rauber, M. Bethge and F. A. Wichmann, “Comparing Deep Neural Networks Against Humans: Object Recognition when The Signal Gets Weaker,” arXiv :1706.06969, 2017 [30]N. Srivastava, G Hinton, A. Krizhevsky, I. Sutskever and R. Salakhutdinov, “Dropout: A Simple Way to Prevent Neural Networks from Overfitting,” Journal of Machine Learning Research, vol. 15, pp. 1929-1958, 2014. [31]S. M. Ross, Introduction to Probability and Statistics for Engineers and Scientists, Cambridge, MA, USA: Academic Press, pp. 141, 2009 [32]Pandas, https://pandas.pydata.org/ [33]Numpy, https://numpy.org/ [34]Scikit-learn, https://scikit-learn.org/ [35]Matplotlib, https://matplotlib.org/ [36]Seaborn, https://seaborn.pydata.org/ [37]P. David and Ailab, “Evaluation: From Precision, Recall and F-measure to ROC, Informedness, Markedness and Correlation,” Journal of Machine Learning Technologies, vol. 2, pp. 2229-3981, 2011 [38]D. P. Kingma, J. Ba, “Adam: A Method for Stochastic Optimization,” arXiv:1412.6980, 2014
|