A novel hierarchical intrusion detection system based on decision tree and rules-based models, 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019. ,
Deep learning approach combining sparse autoencoder with SVM for network intrusion detection, IEEE Access, 2018. ,
Weakly supervised learning: How to engineer labels for machine learning in cyber-security, Data Science for Cyber-Security, 2018. ,
Exploiting the auto-encoder residual error for intrusion detection, IEEE European Symposium on Security and Privacy Workshops, 2019. ,
A variational baysian framework for graphical models, Advances in neural information processing systems, 2000. ,
Network anomaly detection with stochastically improved autoencoder based models, IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud, 2017. ,
Anomaly intrusion detection system using hierarchical gaussian mixture model, International journal of computer science and network security, 2008. ,
The cybox language specification. draft, The MITRE Corporation, 2012. ,
Mora: A generative approach to extract spatiotemporal information applied to gesture recognition, 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2018. ,
Maximum likelihood from incomplete data via the EM algorithm, Journal of the Royal Statistical Society: Series B (Methodological, 1977. ,
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study, Journal of Information Security and Applications, 2020. ,
Bottrack: tracking botnets using netflow and pagerank, International Conference on Research in Networking, 2011. ,
An evaluation framework for intrusion detection dataset, International Conference on Information Science and Security (ICISS), 2016. ,
The taser intrusion recovery system, ACM SIGOPS Operating Systems Review, 2005. ,
Deep learning, 2016. ,
Backtracking intrusions, ACM SIGOPS Operating Systems Review, 2003. ,
Mining causality of network events in log data, IEEE Transactions on Network and Service Management, 2017. ,
Botgm: Unsupervised graph mining to detect botnets in traffic flows, 1st Cyber Security in Networking Conference (CSNet, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01636480
Modèles connexionnistes de l'apprentissage, 1987. ,
Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2019. ,
Holmes: real-time apt detection through correlation of suspicious information flows, IEEE Symposium on Security and Privacy (SP), 2019. ,
SU-IDS: A semi-supervised and unsupervised framework for network intrusion detection, International Conference on Cloud Computing and Security, 2018. ,
, Botgrep: Finding P2P bots with structured graph analysis. In: USENIX security symposium, 2010.
Bro: a system for detecting network intruders in real-time, Computer networks, 1999. ,
Hercule: Attack story reconstruction via community discovery on correlated log graph, Proceedings of the 32th Annual Conference on Computer Security Applications, 2016. ,
A review of novelty detection, Signal Processing, 2014. ,
Outliers in statistical data. j. wiley & sons 1994, xvii. 582 pp.,£ 49.95, Biometrical Journal, 1995. ,
The gremlin graph traversal machine and language, Proceedings of the 15th Symposium on Database Programming Languages, 2015. ,
Radiot: Radio communications intrusion detection for iot-a protocol independent approach, IEEE 17th International Symposium on Network Computing and Applications (NCA), 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01914981
Guide to intrusion detection and prevention systems (IDPS), 2012. ,
Toward generating a new intrusion detection dataset and intrusion traffic characterization, 2018. ,
High fidelity data reduction for big data security dependency analyses, ACM SIGSAC Conference on Computer and Communications Security, 2016. ,
Kitsune: An ensemble of autoencoders for online network intrusion detection, Network and Distributed System Security Symposium (NDSS), 2018. ,