Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/1837
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | R, Vani | - |
dc.date.accessioned | 2020-09-29T05:22:03Z | - |
dc.date.available | 2020-09-29T05:22:03Z | - |
dc.date.issued | 2017-10 | - |
dc.identifier.issn | 2278-1021 | - |
dc.identifier.uri | https://ijarcce.com/upload/2017/october-17/IJARCCE%2066.pdf | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/1837 | - |
dc.description.abstract | Intrusion Detection Systems are core part of cyber security measures in all organizations. With increasing amount of data available online in digitized form, this has resulted in an ever growing need for stringent cyber security measures against data breaches and malware attacks. Rising number of attacks coupled with new variants of malware being released on a frequent basis require automated intrusion detection systems. With the state of the art performance of the Deep Learning based Models in the field of computer vision, natural language processing and speech recognition, Deep learning techniques are now being applied to the field of cyber security. The review classifies the Deep Learning models and examines 23 papers in which Deep Learning has been efficiently implemented in Intrusion Detection Systems. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IJARCCE International Journal of Advanced Research in Computer and Communication Engineering | en_US |
dc.subject | Deep Learning | en_US |
dc.subject | Intrusion Detection Systems | en_US |
dc.subject | Anomaly Based Detection | en_US |
dc.subject | IDS | en_US |
dc.title | TOWARDS EFFICIENT INTRUSION DETECTION USING DEEP LEARNING TECHNIQUES: A REVIEW | en_US |
dc.type | Article | en_US |
Appears in Collections: | International Journals |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
TOWARDS EFFICIENT INTRUSION DETECTION USING DEEP LEARNING TECHNIQUES A REVIEW.docx | 10.24 kB | Microsoft Word XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.