1. Flow-Based Approach on Bro Intrusion Detection;Alaidaros H.;Journal of Telecommunication, Electronic and Computer Engineering (JTEC),2017
2. Albahar , M. A. ( 2019 ). Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments. 2019(D1) . Albahar, M. A. (2019). Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments. 2019(D1).
3. Fedynyshyn , G. , Chuah , M. C. , & Tan , G. ( 2014 ). Detection and Classification of Different Botnet C & C Channels Detection and Classification of Different Botnet C & C Channels. May. https://doi.org/10.1007/978-3-642-23496-5 10.1007/978-3-642-23496-5 Fedynyshyn, G., Chuah, M. C., & Tan, G. (2014). Detection and Classification of Different Botnet C & C Channels Detection and Classification of Different Botnet C & C Channels. May. https://doi.org/10.1007/978-3-642-23496-5
4. Preventing Model Overfitting and Underfitting in Convolutional Neural Networks
5. Dropout: A Simple Way to Prevent Neural Networks from Overfitting;Hinton N. S. G.;Journal of Machine Learning Research,2014