Outlier Detection in IoT Using Generative Adversarial Network

作者: B. Joyce Beula Rani , L. Sumathi

DOI: 10.32628/CSEIT206452

关键词:

摘要:

参考文章(16)
N. Srivastav, R. K. Challa, Novel intrusion detection system integrating layered framework with neural network ieee international advance computing conference. pp. 682- 689 ,(2013) , 10.1109/IADCC.2013.6514309
, Generative Adversarial Nets neural information processing systems. ,vol. 27, pp. 2672- 2680 ,(2014) , 10.3156/JSOFT.29.5_177_2
Elisa Bertino, Nayeem Islam, Botnets and Internet of Things Security Computer. ,vol. 50, pp. 76- 79 ,(2017) , 10.1109/MC.2017.62
Charu C. Aggarwal, Deepak S. Turaga, Saket Sathe, Jinghui Chen, Outlier Detection with Autoencoder Ensembles. siam international conference on data mining. pp. 90- 98 ,(2017)
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Jeffrey Voas, DDoS in the IoT: Mirai and Other Botnets Computer. ,vol. 50, pp. 80- 84 ,(2017) , 10.1109/MC.2017.201
Vijay Ramaseshan Chandrasekhar, Gaurav Manek, Houssam Zenati, Bruno Lecouat, Chuan Sheng Foo, Efficient GAN-Based Anomaly Detection arXiv: Learning. ,(2018)
Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Asaf Shabtai, Dominik Breitenbacher, Yuval Elovici, N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders arXiv: Cryptography and Security. ,(2018) , 10.1109/MPRV.2018.03367731
Houssam Zenati, Manon Romain, Chuan-Sheng Foo, Bruno Lecouat, Vijay Chandrasekhar, Adversarially Learned Anomaly Detection 2018 IEEE International Conference on Data Mining (ICDM). pp. 727- 736 ,(2018) , 10.1109/ICDM.2018.00088
Hayretdin Bahsi, Sven Nomm, Fabio Benedetto La Torre, Dimensionality Reduction for Machine Learning Based IoT Botnet Detection international conference on control, automation, robotics and vision. pp. 1857- 1862 ,(2018) , 10.1109/ICARCV.2018.8581205
Sowmya Ramapatruni, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi, Karuna Joshi, None, Anomaly Detection Models for Smart Home Security international conference on big data security on cloud. pp. 19- 24 ,(2019) , 10.1109/BIGDATASECURITY-HPSC-IDS.2019.00015