One-class collective anomaly detection based on long short-term memory recurrent neural networks

NN Thi, VL Cao, NA Le-Khac - arXiv preprint arXiv:1802.00324, 2018 - arxiv.org
Intrusion detection for computer network systems has been becoming one of the most critical
tasks for network administrators today. It has an important role for organizations …

Mimicry resilient program behavior modeling with LSTM based branch models

H Yi, G Kim, J Lee, S Ahn, Y Lee, S Yoon… - arXiv preprint arXiv …, 2018 - arxiv.org
In the software design, protecting a computer system from a plethora of software attacks or
malware in the wild has been increasingly important. One branch of research to detect the …

Lstm-based anomalous behavior detection in multi-agent reinforcement learning

C Lischke, T Liu, J McCalmon… - … on Cyber Security …, 2022 - ieeexplore.ieee.org
Multi-Agent Reinforcement Learning (MARL) extends individual reinforcement learning to
enable a team of agents to collaboratively determine the global optimal policy that …

Mobile application network behavior detection and evaluation with wgan and bi-lstm

S Wei, P Jiang, Q Yuan, J Wang - TENCON 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
In this paper, we present a modeling and learning method to analyze the network behavior
of mobile applications based on the Android platform. Various application system sand …

IoT Network Intrusion Detection Using Ensemble Learning Approach

MF Hasan, MH Moon, DM Raza - 2023 14th International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a sophisticated paradigm in which a vast number of items are
networked together. These interconnected gadgets create a network of intelligent systems …

Designing Deep Learning Based Network Intrusion Detection System for Software Defined Network

MHA Abdullah - 2020 - search.proquest.com
In response to the growing cyber-attacks against governments and commercial companies
globally, Network Intrusion Detection Systems (NIDS) have been rapidly developed in …

Machine Learning Techniques in Intrusion Detection System: A Survey

R Khandait, U Chourasia, P Dixit - Computer Vision and Robotics …, 2023 - Springer
Artificial intelligence approaches have been extremely popular, they continue to play a
major role in controlling and mitigating security threats. Information security is important …

A short review on applications of deep learning for cyber security

S KP - arXiv preprint arXiv:1812.06292, 2018 - arxiv.org
Deep learning is an advanced model of traditional machine learning. This has the capability
to extract optimal feature representation from raw input samples. This has been applied …

Une approche d'optimisation pour une meilleure efficacité d'un modèle d'estimation de temps restant utile du moteur à double flux à base de deep learning

H Nihal - 2022 - dspace.centre-univ-mila.dz
L'estimation de la durée de vie utile restante (RUL) est une mesure pronostique efficace qui
prévoit l'état de santé de la machine en fonction de la modélisation de la dégradation et de …

Atmospheric Environment Data Generation Method Based on Stacked LSTM-GRU

F Zhang, X Gao, S Zhang, Q Wang… - 2021 IEEE 15th …, 2021 - ieeexplore.ieee.org
At present, most of the meteorological prediction research is mainly aimed at one weather
parameter, and in this paper, a LSTM-GRU-multi network model is proposed to generate …