Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
Published 2019 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
Authors
Keywords
-
Journal
NEURAL COMPUTING & APPLICATIONS
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2019-10-18
DOI
10.1007/s00521-019-04557-3
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Distributed attack detection scheme using deep learning approach for Internet of Things
- (2018) Abebe Abeshu Diro et al. Future Generation Computer Systems-The International Journal of eScience
- Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
- (2018) Muhamad Erza Aminanto et al. IEEE Transactions on Information Forensics and Security
- New deep learning method to detect code injection attacks on hybrid applications
- (2018) Ruibo Yan et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Using generative adversarial networks for improving classification effectiveness in credit card fraud detection
- (2017) Ugo Fiore et al. INFORMATION SCIENCES
- A New Deep Learning Approach for Anomaly Base IDS using Memetic Classifier
- (2017) Shahriar Mohammadi et al. International Journal of Computers Communications & Control
- A survey of deep neural network architectures and their applications
- (2017) Weibo Liu et al. NEUROCOMPUTING
- Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders
- (2017) Yang Yu et al. Security and Communication Networks
- Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism
- (2017) Youbiao He et al. IEEE Transactions on Smart Grid
- A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
- (2017) Chuanlong Yin et al. IEEE Access
- Automatic identification of integrity attacks in cyber-physical systems
- (2016) Stavros Ntalampiras EXPERT SYSTEMS WITH APPLICATIONS
- Adversarial Feature Selection Against Evasion Attacks
- (2016) Fei Zhang et al. IEEE Transactions on Cybernetics
- Droiddetector: android malware characterization and detection using deep learning
- (2016) Zhenlong Yuan et al. TSINGHUA SCIENCE AND TECHNOLOGY
- Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security
- (2016) Min-Joo Kang et al. PLoS One
- Accelerating wrapper-based feature selection with K-nearest-neighbor
- (2015) Aiguo Wang et al. KNOWLEDGE-BASED SYSTEMS
- Subspace learning for unsupervised feature selection via matrix factorization
- (2015) Shiping Wang et al. PATTERN RECOGNITION
- The NumPy Array: A Structure for Efficient Numerical Computation
- (2011) Stéfan van der Walt et al. COMPUTING IN SCIENCE & ENGINEERING
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now