Aygün RC, Yavuz AG, 2017. A stochastic data discrimination based autoencoder approach for network anomaly detection. Proc 5th Signal Processing and Communications Applications Conf, p.1–4. https://doi.org/10.1109/SIU.2017.7960410 Book Google Scholar
Bonawitz K, Ivanov V, Kreuter B, et al., 2017. Practical secure aggregation for privacy–preserving machine learning. Proc ACM SIGSAC Conf on Computer and Communications Security, p.1175–1191. https://doi.org/10.1145/3133956.3133982 Book Google Scholar
Chowdhury MMU, Hammond F, Konowicz G, et al., 2017. A few–shot deep learning approach for improved intrusion detection. Proc 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conf, p.456–462. https://doi.org/10.1109/UEMCON.2017.8249084 Book Google Scholar
Kokila RT, Selvi ST, Govindarajan K, 2014. DDoS detection and analysis in SDN–based environment using support vector machine classifier. Proc 6th Int Conf on Advanced Computing, p.205–210. https://doi.org/10.1109/ICoAC.2014.7229711 Book Google Scholar
Korczak J, Hernes M, 2017. Deep learning for financial time series forecasting in a–trader system. Proc Federated Conf on Computer Science and Information Systems, p.905–912. https://doi.org/10.15439/2017F449 Book Google Scholar
Li GL, Wu J, Li JH, et al., 2018. Service popularity–based smart resources partitioning for fog computing–enabled industrial Internet of Things. IEEE Trans Ind Inform, 14(10):4702–4711. https://doi.org/10.1109/TII.2018.2845844 Article Google Scholar
Manning CD, Surdeanu M, Bauer J, et al., 2014. The Stanford CoreNLP natural language processing toolkit. Proc 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations, p.55–60. https://doi.org/10.3115/v1/P14-501. Book Google Scholar
Meng WZ, Li WJ, Kwok LF, 2015. Design of intelligent KNNbased alarm filter using knowledge–based alert verification in intrusion detection. Secur Commun Netw, 8(18): 3883–3895. https://doi.org/10.1002/sec.1307 Article Google Scholar
Meng X, Shan Z, Liu FD, et al., 2017. MCSMGS: malware classification model based on deep learning. Int Conf on Cyber–Enabled Distributed Computing and Knowledge Discovery, p.272–275. https://doi.org/10.1109/CyberC.2017.21 Google Scholar
Moosavi–Dezfooli SM, Fawzi A, Frossard P, 2016. DeepFool: a simple and accurate method to fool deep neural networks. IEEE Conf on Computer Vision and Pattern Recognition, p.2574–2582. https://doi.org/10.1109/CVPR.2016.282 Google Scholar
Olalere M, Abdullah MT, Mahmod R, et al., 2016. Identification and evaluation of discriminative lexical features of malware URL for real–time classification. Int Conf on Computer and Communication Engineering, p.90–95. https://doi.org/10.1109/ICCCE.2016.31 Book Google Scholar
Syarif AR, Gata W, 2017. Intrusion detection system using hybrid binary PSO and K–nearest neighborhood algorithm. 11th Int Conf on Information & Communication Technology and System, p.181–186. https://doi.org/10.1109/ICTS.2017.8265667 Book Google Scholar
Vinayakumar R, Soman KP, Poornachandran P, et al., 2018. Detecting Android malware using long short–term memory (LSTM). J Int Fuzzy Syst, 34(3):1277–1288. https://doi.org/10.3233/JIFS-16942. Google Scholar
Vuong TP, Loukas G, Gan D, et al., 2015. Decision tree–based detection of denial of service and command injection attacks on robotic vehicles. IEEE Int Workshop on Information Forensics and Security, p.1–6. https://doi.org/10.1109/WIFS.2015.7368559 Book Google Scholar
Zhao GZ, Zhang CX, Zheng LJ, 2017. Intrusion detection using deep belief network and probabilistic neural network. IEEE Int Conf on Computational Science and Engineering and IEEE Int Conf on Embedded and Ubiquitous Computing, p.639–642. https://doi.org/10.1109/CSE-EUC.2017.119 Book Google Scholar
Zhu DL, Jin H, Yang Y, et al., 2017. DeepFlow: deep learning–based malware detection by mining Android application for abnormal usage of sensitive data. IEEE Symp on Computers and Communications, p.438–443. https://doi.org/10.1109/ISCC.2017.8024568 Google Scholar
Zolotukhin M, Hämäläinen T, Kokkonen T, et al., 2016. Increasing web service availability by detecting application–layer DDoS attacks in encrypted traffic. Proc 23rd Int Conf on Telecommunications, p.1–6. https://doi.org/10.1109/ICT.2016.7500408 Google Scholar