Kim, S.K., McMahon, P.L., Olulotun, K.: A large-scale architecture for restricted Boltzmann machines. 47, 25–39 (2014)Īlom, M.Z., Bontupalli, V., Taha, T.M.: Intrusion detection using deep belief networks. Scholarpedia 2(5), 1668 (2007)įischer, A., Igel, C.: Training restricted Boltzmann machines: an introduction. 192–198, August 2010ĭeng, L., Yu, D.: Deep learning methods and applications. In: Proceedings of the 2010 International Conference on Advances in Social Networks and Mining, pp. Lin, F., Cohen, W.W.: Semi-supervised classification of network data using very few labels. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 1(11), 1–7 (2014)Ĭaruana, R., Niculescu-Mizil, A.: An empirical comparison of supervised learning algorithms. Koturwar, P., Girase, S., Mukhopadhyay, D.: A survey of classification techniques in the area of big data. Namratha, M., Prajwala, T.R.: A comprehensive overview of clustering algorithms in pattern recognition. In: Proceedings of the 12th WSEAS International Conference on Information Security and Privacy, pp. 127–135 (2013)Ĭhae, H., Jo, B., Choi, S., Park, T.: Feature selection for intrusion detection using NSL-KDD. In: Fifth Scientific Conference Information Technology, vol. Ibraheem, N.B., Jawhar, M.M.T., Osman, H.M.: Principle components analysis and multi-layer perceptron based intrusion detection system. 3(1), 332–335 (2012)īajaj, K., Arora, A.: Dimension reduction in intrusion detection features using discriminative machine learning approach. 5(4), 147–157 (2013)ĭatti, R., Lakhina, S.: Performance comparison of features reduction techniques for intrusion detection system. Taiwan 5(2), 67–72 (2002)Įlrawy, M.F., Abdelhamid, T.K., Mohamed, A.M.: IDS in telecommunication network using PCA. Motoda, H., Liu, H.: Feature selection, extraction, and construction. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, pp. John, G.H., Langley, P.: Static versus dynamic sampling for data mining, KDD 96. Jain, A.K.: Data clustering: 50 years beyond K-means. Panwar, S.S., Raiwani, Y.P.: Data reduction techniques to analyze NSL-KDD Dataset. In: Research advances in the integration of big data and smart computing, information science reference (an imprint of IGI global), p. 1(2), 54–63 (2012)ĭas, S., Kalita, H.K.: Advanced dimensionality reduction method for big data. Vinchurkar, D.P., Reshamwala, A.: A review of intrusion detectiom system using neural network and machine learning technique. Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. In: Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009), pp. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 dataset. Big Data 2(1), 1 (2015)ĭeng, L., Yu, D.: Deep learning: methods and applications. Najafabadi, M.M., Villanustre, F., Khoshgoftaar, T.M., Seliya, N., Wald, R., Muharemagic, E.: Deep learning applications and challenges in big data analytics. Ning, P., Jajodia, S.: Intrusion detection techniques. Graduate Project Technical Report, TAMUCC, pp. 1–11, May 2016Īhmed, A.: Signature-based network inrusion detection system using JESS(SNIDJ). In: 9th EAI International Conference on Bio-Inspired Information and Communications Technologies, pp. Niyaz, Q., Sun, W., Javaid, A.Y., Alam, M.: A deep learning approach for network intrusion detection system. Salama, M.A., Eid, H.F., Ramadan, R.A., Darwish, A., Hassanien, A.E.: Hybrid intelligent intrusion detection scheme. Li, Y., Ma, R., Jiao, R.: Hybrid malicious code detection method based on deep learning. Gartner Provides Three Immediate Actions to Take as WannaCry Ransomware Spreads. STBODY = we.FindElementByTag("tbody").Semente: 2016 Internet Security Threat Report (ISTR), vol. ' iACLASSPosition = a string < ' iLocalPosition = a string Local: é única no elemento TBODY e o status que procuramos começa 14 caracteres depois disso. ' iACLASSPosition = the string < ' iLocalPosition = the string Local: is unique in the element TBODY and the status we are looking for starts 14 characters after this. ' span class="bold eventoLocal" Local: /span CURITIBA / PR
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |