NLP methods in host-based intrusion detection systems: A systematic review and future directions
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
NLP methods in host-based intrusion detection systems: A systematic review and future directions
Authors
Keywords
-
Journal
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume 220, Issue -, Pages 103761
Publisher
Elsevier BV
Online
2023-10-06
DOI
10.1016/j.jnca.2023.103761
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A comprehensive survey and taxonomy of the SVM-based intrusion detection systems
- (2021) Mokhtar Mohammadi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
- (2021) Sang-Woong Lee et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
- (2021) Ishai Rosenberg et al. ACM COMPUTING SURVEYS
- Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection
- (2021) Tommaso Zoppi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Text Mining in Cybersecurity
- (2021) Luciano Ignaczak et al. ACM COMPUTING SURVEYS
- Investigation of Dual-Flow Deep Learning Models LSTM-FCN and GRU-FCN Efficiency against Single-Flow CNN Models for the Host-Based Intrusion and Malware Detection Task on Univariate Times Series Data
- (2020) Dainius Čeponis et al. Applied Sciences-Basel
- Deep learning methods in network intrusion detection: A survey and an objective comparison
- (2020) Sunanda Gamage et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Software Vulnerability Detection Using Deep Neural Networks: A Survey
- (2020) Guanjun Lin et al. PROCEEDINGS OF THE IEEE
- Intrusion detection in smart cities using Restricted Boltzmann Machines
- (2019) Asmaa Elsaeidy et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Sentiment Classification Using Convolutional Neural Networks
- (2019) Hannah Kim et al. Applied Sciences-Basel
- A survey of network-based intrusion detection data sets
- (2019) Markus Ring et al. COMPUTERS & SECURITY
- A Survey of Intrusion Detection Systems Leveraging Host Data
- (2019) Robert A. Bridges et al. ACM COMPUTING SURVEYS
- Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
- (2019) Arwa Aldweesh et al. KNOWLEDGE-BASED SYSTEMS
- Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
- (2019) A. M. Aleesa et al. NEURAL COMPUTING & APPLICATIONS
- Definitions, methods, and applications in interpretable machine learning
- (2019) W. James Murdoch et al. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA
- Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
- (2019) Hongyu Liu et al. Applied Sciences-Basel
- A hybrid deep learning model for efficient intrusion detection in big data environment
- (2019) Mohammad Mehedi Hassan et al. INFORMATION SCIENCES
- Machine Learning and Deep Learning Methods for Cybersecurity
- (2018) Yang Xin et al. IEEE Access
- A systematic review on intrusion detection based on the Hidden Markov Model
- (2018) Ali Ahmadian Ramaki et al. Statistical Analysis and Data Mining
- Guidelines for including grey literature and conducting multivocal literature reviews in software engineering
- (2018) Vahid Garousi et al. INFORMATION AND SOFTWARE TECHNOLOGY
- Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review
- (2018) Fadi Salo et al. IEEE Access
- Host-Based Intrusion Detection System with System Calls
- (2018) Ming Liu et al. ACM COMPUTING SURVEYS
- Automating Intention Mining
- (2018) Qiao Huang et al. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
- An anomaly detection system based on variable N-gram features and one-class SVM
- (2017) Wael Khreich et al. INFORMATION AND SOFTWARE TECHNOLOGY
- Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling
- (2017) W. Haider et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of intrusion detection in Internet of Things
- (2017) Bruno Bogaz Zarpelão et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey on feature drift adaptation: Definition, benchmark, challenges and future directions
- (2017) Jean Paul Barddal et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Contextual information fusion for intrusion detection: a survey and taxonomy
- (2017) Ahmed Aleroud et al. KNOWLEDGE AND INFORMATION SYSTEMS
- Continuous Integration, Delivery and Deployment: A Systematic Review on Approaches, Tools, Challenges and Practices
- (2017) Mojtaba Shahin et al. IEEE Access
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- A survey of the applications of text mining in financial domain
- (2016) B. Shravan Kumar et al. KNOWLEDGE-BASED SYSTEMS
- A survey on text mining in social networks
- (2015) Rizwana Irfan et al. KNOWLEDGE ENGINEERING REVIEW
- Text mining for market prediction: A systematic review
- (2014) Arman Khadjeh Nassirtoussi et al. EXPERT SYSTEMS WITH APPLICATIONS
- Big Data Analytics for Security
- (2014) Alvaro A. Cardenas et al. IEEE SECURITY & PRIVACY
- A systematic review of software architecture visualization techniques
- (2014) Mojtaba Shahin et al. JOURNAL OF SYSTEMS AND SOFTWARE
- A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
- (2013) Gideon Creech et al. IEEE TRANSACTIONS ON COMPUTERS
- An intrusion detection and prevention system in cloud computing: A systematic review
- (2012) Ahmed Patel et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Intrusion detection system: A comprehensive review
- (2012) Hung-Jen Liao et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of intrusion detection techniques in Cloud
- (2012) Chirag Modi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Detecting Intrusions through System Call Sequence and Argument Analysis
- (2008) Federico Maggi et al. IEEE Transactions on Dependable and Secure Computing
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now