Osamor et al., 2022 - Google Patents
Deep learning-based hybrid model for efficient anomaly detectionOsamor et al., 2022
View PDF- Document ID
- 10484618360942644066
- Author
- Osamor F
- Wellman B
- Publication year
- Publication venue
- International Journal of Advanced Computer Science and Applications
External Links
Snippet
It is common among security organizations to run processes system call trace data to predict its anomalous behavior, and it is still a dynamic study region. Learning-based algorithms can be employed to solve such problems since it is typical pattern recognition problem. With …
- 238000001514 detection method 0 title abstract description 29
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Elmasry et al. | Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic | |
Liu et al. | ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples | |
Mac et al. | Detecting attacks on web applications using autoencoder | |
Parsazad et al. | Fast feature reduction in intrusion detection datasets | |
Geetha et al. | A FKPCA-GWO WDBiLSTM classifier for intrusion detection system in cloud environments | |
Bouke et al. | An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability | |
Panagiotou et al. | Host-based intrusion detection using signature-based and ai-driven anomaly detection methods | |
Al-Haija et al. | Analysis of extreme learning machines (ELMs) for intelligent intrusion detection systems: a survey | |
Al-talak et al. | Detecting server-side request forgery (SSRF) attack by using deep learning techniques | |
Almotairi et al. | Efficient Intrusion Detection using OptCNN-LSTM Model based on hybrid Correlation-based Feature Selection in IoMT. | |
Vibhute et al. | An LSTM‐based novel near‐real‐time multiclass network intrusion detection system for complex cloud environments | |
Barik et al. | Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network | |
Osamor et al. | Deep learning-based hybrid model for efficient anomaly detection | |
Prusti | Efficient intrusion detection model using ensemble methods | |
US11997137B2 (en) | Webpage phishing detection using deep reinforcement learning | |
Yeboah-Ofori et al. | Cyber threat ontology and adversarial machine learning attacks: analysis and prediction perturbance | |
Liu et al. | Model stealing detection for iot services based on multi-dimensional features | |
Nguyen et al. | Deep learning in NLP for anomalous HTTP requests detection | |
Dao et al. | Demystifying deep neural networks through interpretation: A survey | |
Vrejoiu | Neural networks and deep learning in cyber security | |
Xu et al. | [Retracted] IoT‐Oriented Distributed Intrusion Detection Methods Using Intelligent Classification Algorithms in Spark | |
Prasad et al. | HIDSC2: Host-based intrusion detection system in cloud computing | |
Priyanga et al. | Detection of cyberattacks in cyber-physical systems using supervised learning and hypergraphs | |
Vahakainu et al. | Adversarial poisoning attack's impact on prediction functionality of ml-based feedback loop system in cyber-physical context | |
Santhosh et al. | Using uncertainty as a defense against adversarial attacks for tabular datasets |