|
[1]M. Choraś and R. Kozik, "Machine learning techniques applied to detect cyber attacks on web applications," Logic Journal of the IGPL, vol. 23, no. 1, pp. 45-56, Feb. 2015. [2]S. Maleki, S. Maleki, and N. R. Jennings, “Unsupervised anomaly detection with LSTM autoencoders using statistical data-filtering,” Applied Soft Computing, vol. 108, p. 107443, Sep. 2021. [3]Y. Xin et al., “Machine Learning and Deep Learning Methods for Cybersecurity,” IEEE Access, vol. 6, pp. 35365–35381, Jan. 2018. [4]A. Binbusayyis and T. Vaiyapuri, “Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM,” Applied Intelligence, vol. 51, no. 10, pp. 7094–7108, Feb. 2021. [5]J. Liu, D. Yang, M. Lian, and M. Li, “Research on Intrusion Detection Based on Particle Swarm Optimization in IoT,” IEEE Access, vol. 9, pp. 38254–38268, Jan. 2021. [6]S. M. Kasongo, “An Advanced Intrusion Detection System for IIoT Based on GA and Tree Based Algorithms,” IEEE Access, vol. 9, pp. 113199–113212, Jan. 2021. [7]R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, “Deep Learning Approach for Intelligent Intrusion Detection System,” IEEE Access, vol. 7, pp. 41525–41550, Jan. 2019. [8]H. Hindy, R. D. Atkinson, C. Tachtatzis, J.-N. Colin, E. Bayne, and X. Bellekens, “Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection,” Electronics, vol. 9, no. 10, p. 1684, Oct. 2020. [9]B. Min, J.-H. Yoo, S. Kim, and D. Shin, “Network Anomaly Detection Using Memory-Augmented Deep Autoencoder,” IEEE Access, vol. 9, pp. 104695–104706, Jan. 2021. [10]R. J. Hsieh, J. Chou and C. H. Ho, "Unsupervised Online Anomaly Detection on Multivariate Sensing Time Series Data for Smart Manufacturing," in: Proceedings of the IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA), Kaohsiung, Taiwan, 2019, pp. 90-97. [11]J. H. Lee and K. Park, “AE-CGAN Model based High Performance Network Intrusion Detection System,” Applied Sciences, vol. 9, no. 20, p. 4221, Oct. 2019. [12]N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in: Proceedings of the Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, 2015, pp. 1-6. [13]I. Sharafaldin, A. H. Lashkari and A. A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization,” in: Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP), Funchal, Madeira, Portugal, 2018, pp. 108-116. [14]B. Reis, E. Maia and I. Praça, “Selection and Performance Analysis of CICIDS2017 Features Importance,” in: Proceedings of the International Symposium on Foundations and Practice of Security (FPS), Toulouse, France, 2019, pp. 56-71. [15]T. Janarthanan and S. Zargari, "Feature selection in UNSW-NB15 and KDDCUP'99 datasets," in: Proceedings of the IEEE 26th International Symposium on Industrial Electronics (ISIE), Edinburgh, UK, 2017, pp. 1881-1886.
|