Funder
Australian Research Council Discovery Project
Hunan Provincial Natural Science Foundation of China
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference53 articles.
1. Leung K, Leckie C (2005) Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the Twenty-eighth Australasian conference on Computer Science Vol 38, pp 333–342. Australian Computer Society, Inc
2. Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Jiankun H (2015) Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans Comput 64(9):2519–2533
3. Garg S, Kaur K, Kumar N, Rodrigues JJPC (2019) Hybrid deep learning-based anomaly detection scheme for suspicious flow detection in sdn: a social multimedia perspective. IEEE Trans Multimed 21(3):566–578
4. Shon T, Moon J (2007) A hybrid machine learning approach to network anomaly detection. Inf Sci 177(18):3799–3821
5. Tolga E, Serdar KS (2020) Unsupervised anomaly detection with lstm neural networks. IEEE Trans Neural Netw Learn Syst 31(8):3127–3141
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献