References
- P. Laskov et al., "Learning intrusion detection: Supervised or unsupervised?," In Image Analysis and Processing ICIAP 2005, vol. 3617 of Lecture Notes in Computer Science, pp.50-57, Springer Berlin Heidelberg, 2005.
- W. Lee and S. J. Stolfo, "Data mining approaches for instrusion detection," In Proceedings of the 7th USENIX Security Symposium, vol. 7, pp. 6-6, Berkeley, CA, USA, 1998.
- C. Sinclair et al., "An application of machine learning to network instrution detection," In Proceeding of the 15th Annual Computer Security Applications Conferences, ACSAC'99, Washington, DC, USA, 1999.
- W. Li, "Using genetic algorithm for network intrusion detection," In Proceedings of the US DoE Cybersecurity Conference, Kansas City, KS, USA, 2004.
- S. Mukkamala, G. Janoski and A. Sung, "Intrusion detection using neural networks and support vector machines," In Proceedings of the 2002 International Joint Conference on Neural Networks (IJCNN), vol. 2, pp. 1702-1707, 2002.
- J. Gomer and D. Dasgupta, "Evolving fuzzy classifiers for intrusion detection," In Proceedings of the 2002 IEEE Workshop on Information Assurance West Point, NY, USA, 2002.
- A. Steven, S. Forrest and A. Somayaji, "Intrusion detection using sequences of system calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, August 1998. https://doi.org/10.3233/JCS-980109
- J. Kim, J. Peter, U. Aickelin, J. Greensmith, G. Tedesco and J. Twycross, "Immune system approaches to intrusion detection," Natureal Computing, vol. 6, no. 4, pp. 413-466, December 2007. https://doi.org/10.1007/s11047-006-9026-4
- M. Zamani et al., "A DDoS-aware IDS model based on danger theory and mobile agents," In Proceedings of the 2009 International Conferences on Computational Intelligence and Security, vol. 1, pp. 516-520, 2009.
- M. Zamani et al., "A danger-based approach to intrsusion detection," CoRR, 2014.
- X. Glorot, A. Bordes and Y. Bengio, "Deep sparse rectifier neural networks," International Conference on Artificial Intelligence and Statistics, 2011.
- V. Nair and G. E. Hinton, "Rectified linear units improve restricted boltzmann machines," Proceedings of the 27th International Conference on Machine Learning, 2010.
- A. L. Mass, A. Y. Hannun, and A. Y. Ng, "Rectifier nonlinearities improve neural network acoustic models," In ICML, vol. 30, 2013.
- D. Clevert, T. Unterthiner and S. HochreiterAcb, "Fast and Accuracy Deep Network Learning by Exponential Linear Units," http:/arxiv.org/abs/1511.07289, 2016.
- K. Jihyun, K. Jaehyun, L. T. T. Huong and K. Howon, "Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection," International Conference on Platform Technology and Service, 2015.