Author:
Geng Jinbu,Cheng Zhenyu,Liu Zhicheng,Li Shuhao,Qin Rui
Publisher
Springer International Publishing
Reference22 articles.
1. Akamai 2020 state of the internet/security. https://www.akamai.com/content/dam/site/en/documents/state-of-the-internet/soti-security-financial-services-hostile-takeover-attempts-report-2020.pdf. Accessed 21 Oct 2021
2. https://en.wikipedia.org/wiki/Occam%27s_razor. Accessed 21 Oct 2021
3. Chiba, Z., Abghour, N., Moussaid, K., Rida, M., et al.: Intelligent approach to build a deep neural network based ids for cloud environment using combination of machine learning algorithms. Comput. Secur. 86, 291–317 (2019)
4. Dong, B., Wang, X.: Comparison deep learning method to traditional methods using for network intrusion detection. In: 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN), pp. 581–585. IEEE (2016)
5. Geng, J., Li, S., Zhang, Y., Liu, Z., Cheng, Z.: LIFH: learning interactive features from http payload using image reconstruction. In: ICC 2021-IEEE International Conference on Communications, pp. 1–6. IEEE (2021)