[PDF][PDF] Research on intrusion detection based on deep confidence network

L Yu - Computer Science and Application, 2018 - scholar.archive.org
… frontier technology of machine learning and artificial intelligence, … intrusion detection problem.
This paper studies the traditional intrusion detection technology based on learning method

[PDF][PDF] A method of APT attack detection based on DBN-SVDD

F Liu, Y Li, F Xia, J Zhou - Comput. Sci. Appl, 2017 - scholar.archive.org
… attack detection method has low accuracy in the detection, a … , a network intrusion detection
model (DBN-SVDD) based on … Comparison with the results of other deep learning methods

[PDF][PDF] The svm intrusion detection problem based on nonlinear projection and penalty function

Y Cui, L Li, D Cao - Information Technology and Informatization, 2014 - scholar.archive.org
… For low-dimensional data projection thus obtained with a penalty function reuse nonlinear
support vector model and implement intrusion detection data. Finally, we use the KDD99 data …

[PDF][PDF] Abnormal vessel behavior detection based on AIS Data

S Zhang, Q Tang - Artificial Intelligence and Robotics Research, 2015 - scholar.archive.org
… ways to investigate the law of ship motions and the detection of abnormal behaviours. In this
paper, various algorithms used for detecting abnormal behaviours of ship are reviewed and …

[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… her needs, specifying how the machines are connected, what … The best cyber ranges aim to
simulate real computer networks… using an AI technique, reinforcement learning, to determine …

[HTML][HTML] Data Mining from a Statistical Perspective

JH Maindonald - Statistics Consulting Unit, 1999 - blogjava.net
… The example is, like many of the examples in books on data mining and machine learning,
is a classification problem. It comes from a study of geographical variation in plant …

[PDF][PDF] … and Security Review Commission: Chinese Advances in Unmanned Systems and the Military Applications of Artificial Intelligence—the PLA's Trajectory …

EB Kania - Intelligentized” Warfare,” US-China Economic and …, 2017 - uscc.gov
… an “Artificial Intelligence 2.0 Plan,” which focused on big data, intelligent sensing, … computing,
machine learning, and swarm intelligence.The Ministry of Science and Technology has …

[引用][C] Euclidean-based feature selection for network intrusion detection

A Suebsing, N Hiransakolwong - … Conference on Machine Learning and Computing, 2009

[引用][C] Network intrusion detection model based on Faster R-CNN deep learning

GF Tian, ZL Shan, ZH Liao, YL Wang - Journal of Nanjing University of Technology  …, 2021

[引用][C] A Review on Intrusion Detection of Moving Objects at Sea

D Gu, X Jin - Journal of Image and Signal Processing (S2325-6745), 2020