References
References:
[1] X.-Y. Yang, J. Liu, M.-Q. Zhang, and K. Niu, “A new multi-class svm algorithm based on one-class svm,” in International Conference on Computational Science. Springer, 2007, pp. 677–684.
[2] L. G´omez-Chova, G. Camps-Valls, J. Munoz-Mari, and J. Calpe, “Semisupervised image classification with laplacian support vector machines,” IEEE Geoscience and Remote Sensing Letters, vol. 5, no. 3, pp. 336–340, 2008.
[3] B. Raghavan, M. Casado, T. Koponen, S. Ratnasamy, A. Ghodsi, and S. Shenker, “Software-defined internet architecture: decoupling architecture from infrastructure,” in Proceedings of the 11th ACM Workshop on Hot Topics in Networks. ACM, 2012, pp. 43–48.
[4] A. Ghodsi, S. Shenker, T. Koponen, A. Singla, B. Raghavan, and
J. Wilcox, “Intelligent design enables architectural evolution,” in Proceedings of the 10th ACM Workshop on Hot Topics in Networks. ACM, 2011, p. 3.
[5] T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama et al., “Onix: A distributed control platform for large-scale production networks.” in OSDI, vol. 10, 2010, pp. 1–6.
[6] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. henker, and J. Turner, “Openflow: enabling innovation in campus networks,” ACM SIGCOMM omputer Communication Review, vol. 38, no. 2, pp. 69–74, 2008.
[7] Dimitrios Papamartzivanos, Félix Gómez Mármol, Georgios Kambourakis, Introducing
deep learning self-adaptive misuse network intrusion detection systems, IEEE Access 7 (2019) 13546–13560.
[8] Peng Jiang, Hongyi Wu, Cong Wang, Chunsheng Xin, Virtual MAC spoofing detection through deep learning, in: 2018 IEEE International Conference on Communications (ICC), IEEE, 2018, pp. 1–6.
[9] Sheraz Naseer, Yasir Saleem, Shehzad Khalid, Muhammad Khawar Bashir, Jihun Han, Muhammad Munwar Iqbal, Kijun Han, Enhanced network anomaly detection based on deep neural networks, IEEE Access 6 (2018) 48231–48246.
[10] Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A Ghorbani, A detailed analysis of the KDD cup 99 data set, in: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, IEEE, 2009, pp. 1–6.
[11] Ritesh K Malaiya, Donghwoon Kwon, Jinoh Kim, Sang C Suh, Hyunjoo Kim, Ikkyun Kim, An empirical evaluation of deep learning for network anomaly detection, in: 2018 International Conference on Computing, Networking and Communications (ICNC), IEEE, 2018, pp. 893–898.
[12] Sahil Garg, Kuljeet Kaur, Neeraj Kumar, Georges Kaddoum, Albert Y Zomaya, Rajiv Ranjan, A hybrid deep learning-based model for anomaly detection in cloud datacenter networks, IEEE Trans. Netw. Serv. Manag. 16 (3) (2019) 924–935.
[13] Mahmood Yousefi-Azar, Vijay Varadharajan, Len Hamey, Uday Tupakula, Autoencoder-based feature learning for cyber security applications, in: 2017 International Joint Conference on Neural Networks (IJCNN), IEEE, 2017, pp. 3854–3861.
[14] Vrizlynn L.L. Thing, IEEE 802.11 network anomaly detection and attack classification:
A deep learning approach, in: 2017 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, 2017, pp. 1–6.
[15] Yuanfang Chen, Yan Zhang, Sabita Maharjan, Muhammad Alam, Ting Wu, Deep learning for secure mobile edge computing in cyber-physical transportation systems, IEEE Netw. 33 (4) (2019) 36–41.
[16] Khoi Khac Nguyen, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Diep Nguyen, Eryk Dutkiewicz, Cyberattack detection in mobile cloud computing: A deep learning approach, in: 2018 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, 2018, pp.1–6.
[17] Jiangang Shu, Lei Zhou, Weizhe Zhang, Xiaojiang Du, Mohsen Guizani, Collaborative intrusion detection for VANETs: A deep learning-based distributed SDN approach, IEEE Trans. Intell. Transp. Syst. (2020).
[18] Mahmoud Abbasi, Amin Shahraki, Hamid R Barzegar, Claus Pahl, Synchronization Techniques in ‘‘Device to Device-and Vehicle to Vehicle-Enabled’’ Cellular Networks: A survey, Comput. Electr. Eng., 90 106955.
[19] Wei Zhong, Feng Gu, A multi-level deep learning system for malware detection, Expert Syst. Appl. 133 (2019) 151–162.
[20] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in Proceedings of 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, IEEE, Ottawa, Canada, pp. 1–6, July 2009