F Liu, Y Li, F Xia, J Zhou - Comput. Sci. Appl, 2017 - pdf.hanspub.org
… large numbers of marked samples and other shortcomings. In this paper, a network intrusion detection … Comparison with the results of other deeplearningmethods 表2. 与其他深度学习…
D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… Although technical specifics about the National BigData Cyber Range are hard to find, some … , use of the cyber range could itself generate more training data to feed machinelearning (…
JH Maindonald - Statistics Consulting Unit, 1999 - blogjava.net
… I will emphasise that largedata sets often contain, for the purposes for which the data will be used… It is in the tradition of artificial intelligence, machinelearning, management information …
… employment of the military Internet of Things, bigdata, and cloud computing. However, for … Recently, Baidu’s DeepLearning Lab entered its own artificial intelligence robot in a contest …
S Zhang, Q Tang - Artificial Intelligence and Robotics Research, 2015 - pdf.hanspub.org
… With more and more AIS systems are installed on board, massive amounts of AIS data have … the detection of abnormal behaviours. In this paper, various algorithms used for detecting …
… With the arrival of the era of bigdata and the diversification of network attack means, … of Deeplearning with intrusiondetectiontechnology, and proposes an intrusiondetection model …
… security situation awareness and security bigdata analysis. … intrusiondetectionmethods based on deeplearning. [Conclusions] Intrusiondetection technologies based on deeplearning …