Studying machine learning techniques for intrusion detection systems, FDSE, ser. LNCS, vol.11814, pp.411-426, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02306521
Machine learning based ddos attack detection from source side in cloud," in CSCloud, pp.114-120, 2017. ,
Network intrusion detection for iot security based on learning techniques, IEEE Communications Surveys and Tutorials, vol.21, issue.3, pp.2671-2701, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02500646
Xgboost: A scalable tree boosting system, KDD, pp.785-794, 2016. ,
Using decision trees to improve signature-based intrusion detection, RAID, ser. LNCS, 2003. ,
Naive bayes vs decision trees in intrusion detection systems, SAC, pp.420-424, 2004. ,
Decision tree classifier for network intrusion detection with ga-based feature selection, ACM Southeast Regional Conference, pp.136-141, 2005. ,
A survey of random forest based methods for intrusion detection systems, ACM Comput. Surv, vol.51, issue.3, pp.1-48, 2018. ,
Imagenet classification with deep convolutional neural networks, NIPS, 2012. ,
Deep learning approach for intelligent intrusion detection system, IEEE Access, 2019. ,
HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection, IEEE Access, 2018. ,
Intelligent and improved self-adaptive anomaly based intrusion detection system for networks, IJCNIS, vol.11, issue.2, 2019. ,
Anomaly detection over noisy data using learned probability distributions, ICML, pp.255-262, 2000. ,
Network anomaly detection: Methods, systems and tools, IEEE Communications Surveys and Tutorials, vol.16, issue.1, pp.303-336, 2014. ,
Isolation forest, ICDM, pp.413-422, 2008. ,
Outlier detection on network flow analysis, CoRR, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01854006
Active learning literature survey, 2009. ,
Active learning for network intrusion detection, CoRR, 2019. ,
A comparison study between different sampling strategies for intrusion detection system of active learning model, JCS, 2018. ,
Query learning strategies using boosting and bagging, pp.1-9, 1998. ,
Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers & Security, 2012. ,
Utilizing attack enumerations to study SDN/NFV vulnerabilities, NetSoft. IEEE, pp.356-361, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01763368
Computational trust model for repeated trust games, pp.34-41, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01351250