[1] M. Masdari and M. Jalali, "A survey and taxonomy of DoS attacks in cloud computing," Security and Communication Networks, vol. 9, no. 16, pp. 3724-3751, 2016.
[2] A. Patel, M. Taghavi, K. Bakhtiyari, and J. C. JúNior, "An intrusion detection and prevention system in cloud computing: A systematic review," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 25-41, 2013.
[3] V. Balamurugan and R. Saravanan, "Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation," Cluster Computing, pp. 1-13, 2017.
[4] D. Moon, S. B. Pan, and I. Kim, "Host-based intrusion detection system for secure human-centric computing," The Journal of Supercomputing, vol. 72, no. 7, pp. 2520-2536, 2016.
[5] N. Pandeeswari and G. Kumar, "Anomaly detection system in cloud environment using fuzzy clustering based ANN," Mobile Networks and Applications, vol. 21, no. 3, pp. 494-505, 2016.
[6] N. Hubballi and V. Suryanarayanan, "False alarm minimization techniques in signature-based intrusion detection systems: A survey," Computer Communications, vol. 49, pp. 1-17, 2014.
[7] A. A. Diro and N. Chilamkurti, "Distributed attack detection scheme using deep learning approach for Internet of Things," Future Generation Computer Systems, 2017.
[8] R. Yan, X. Xiao, G. Hu, S. Peng, and Y. Jiang, "New deep learning method to detect code injection attacks on hybrid applications," Journal of Systems and Software, vol. 137, pp. 67-77, 2018.
[9] M. Al-Qurishi, M. Alrubaian, S. M. M. Rahman, A. Alamri, and M. M. Hassan, "A prediction system of Sybil attack in social network using deep-regression model," Future Generation Computer Systems, 2017.
[10] H. Shi, H. Li, D. Zhang, C. Cheng, and X. Cao, "An Efficient Feature Generation Approach based on Deep Learning and Feature Selection Techniques for traffic classification," Computer Networks, 2018.
[11] A. Prieto et al., "Neural networks: An overview of early research, current frameworks and new challenges," Neurocomputing, vol. 214, pp. 242-268, 2016.
[12] A. Aleesa, B. Zaidan, A. Zaidan, and N. M. Sahar, "Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions," Neural Computing and Applications, pp. 1-32.
[13] M. Mohammadi, A. Al-Fuqaha, S. Sorour, and M. Guizani, "Deep learning for IoT big data and streaming analytics: A survey," IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 2923-2960, 2018.
[14] Q. Zhang, L. T. Yang, Z. Chen, and P. Li, "A survey on deep learning for big data," Information Fusion, vol. 42, pp. 146-157, 2018.
[15] S. Osken, E. N. Yildirim, G. Karatas, and L. Cuhaci, "Intrusion Detection Systems with Deep Learning: A Systematic Mapping Study," in 2019 Scientific Meeting on Electrical-Electronics & Biomedical Engineering and Computer Science (EBBT), 2019: IEEE, pp. 1-4.
[16] A. Aldweesh, A. Derhab, and A. Z. Emam, "Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues," Knowledge-Based Systems, p. 105124, 2019.
[17] H. Liu and B. Lang, "Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey," Applied Sciences, vol. 9, no. 20, p. 4396, 2019.
[18] R. Vinayakumar, K. Soman, and P. Poornachandran, "A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs," International Journal of Digital Crime and Forensics (IJDCF), vol. 11, no. 3, pp. 65-89, 2019.
[19] G. Litjens et al., "A survey on deep learning in medical image analysis," Medical image analysis, vol. 42, pp. 60-88, 2017.
[20] L. Zhang, S. Wang, and B. Liu, "Deep learning for sentiment analysis: A survey," Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 8, no. 4, p. e1253, 2018.
[21] S. Zhang, L. Yao, A. Sun, and Y. Tay, "Deep learning based recommender system: A survey and new perspectives," ACM Computing Surveys (CSUR), vol. 52, no. 1, p. 5, 2019.
[22] C. Zhang, P. Patras, and H. Haddadi, "Deep learning in mobile and wireless networking: A survey," IEEE Communications Surveys & Tutorials, 2019.
[23] M. Ahmed, A. N. Mahmood, and J. Hu, "A survey of network anomaly detection techniques," Journal of Network and Computer Applications, vol. 60, pp. 19-31, 2016.
[24] I. Butun, S. D. Morgera, and R. Sankar, "A survey of intrusion detection systems in wireless sensor networks," IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266-282, 2013.
[25] C. V. Zhou, C. Leckie, and S. Karunasekera, "A survey of coordinated attacks and collaborative intrusion detection," Computers & Security, vol. 29, no. 1, pp. 124-140, 2010.
[26] R. Mitchell and I.-R. Chen, "A survey of intrusion detection techniques for cyber-physical systems," ACM Computing Surveys (CSUR), vol. 46, no. 4, p. 55, 2014.
[27] R. Zuech, T. M. Khoshgoftaar, and R. Wald, "Intrusion detection and big heterogeneous data: a survey," Journal of Big Data, vol. 2, no. 1, p. 3, 2015.
[28] E. Vasilomanolakis, S. Karuppayah, M. Mühlhäuser, and M. Fischer, "Taxonomy and survey of collaborative intrusion detection," ACM Computing Surveys (CSUR), vol. 47, no. 4, p. 55, 2015.
[29] M. Masdari, "Markov chain-based evaluation of the certificate status validations in hybrid MANETs," Journal of Network and Computer Applications, vol. 80, pp. 79-89, 2017.
[30] J. Yan, D. Jin, C. W. Lee, and P. Liu, "A Comparative Study of Off-Line Deep Learning Based Network Intrusion Detection," in 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), 2018: IEEE, pp. 299-304.
[31] S. M. Kasongo and Y. Sun, "A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System," IEEE Access, vol. 7, pp. 38597-38607, 2019.
[32] B. Sezari, D. P. Möller, and A. Deutschmann, "Anomaly-Based Network Intrusion Detection Model Using Deep Learning in Airports," in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018: IEEE, pp. 1725-1729.
[33] S. Parampottupadam and A.-N. Moldovann, "Cloud-based Real-time Network Intrusion Detection Using Deep Learning," in 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2018: IEEE, pp. 1-8.
[34] H. Al Najada, I. Mahgoub, and I. Mohammed, "Cyber Intrusion Prediction and Taxonomy System Using Deep Learning And Distributed Big Data Processing," in 2018 IEEE Symposium Series on Computational Intelligence (SSCI), 2018: IEEE, pp. 631-638.
[35] R. Abdulhammed, M. Faezipour, A. Abuzneid, and A. AbuMallouh, "Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic," IEEE sensors letters, vol. 3, no. 1, pp. 1-4, 2019.
[36] G. Karatas, O. Demir, and O. K. Sahingoz, "Deep Learning in Intrusion Detection Systems," in 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018: IEEE, pp. 113-116.
[37] A. Anzer and M. Elhadef, "Deep Learning-Based Intrusion Detection Systems for Intelligent Vehicular Ad Hoc Networks," in Advanced Multimedia and Ubiquitous Engineering: Springer, 2018, pp. 109-116.
[38] Z. Wang, "Deep learning-based intrusion detection with adversaries," IEEE Access, vol. 6, pp. 38367-38384, 2018.
[39] N. Chockwanich and V. Visoottiviseth, "Intrusion Detection by Deep Learning with TensorFlow," in 2019 21st International Conference on Advanced Communication Technology (ICACT), 2019: IEEE, pp. 654-659.
[40] S. Wang, B. Li, M. Yang, and Z. Yan, "Intrusion Detection for WiFi Network: A Deep Learning Approach," in International Wireless Internet Conference, 2018: Springer, pp. 95-104.
[41] L. Gao, F. Li, X. Xu, and Y. Liu, "Intrusion detection system using SOEKS and deep learning for in-vehicle security," Cluster Computing, pp. 1-9, 2018.
[42] S. Ustebay, Z. Turgut, and M. A. Aydin, "Intrusion Detection System with Recursive Feature Elimination by Using Random Forest and Deep Learning Classifier," in 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018: IEEE, pp. 71-76.
[43] F. A. Khan, A. Gumaei, A. Derhab, and A. Hussain, "TSDL: A TwoStage Deep Learning Model for Efficient Network Intrusion Detection," IEEE Access, 2019.
[44] J. Zhang, F. Li, H. Zhang, R. Li, and Y. Li, "Intrusion detection system using deep learning for in-vehicle security," Ad Hoc Networks, vol. 95, p. 101974, 2019.
[45] A. Abusitta, M. Bellaiche, M. Dagenais, and T. Halabi, "A deep learning approach for proactive multi-cloud cooperative intrusion detection system," Future Generation Computer Systems, 2019.
[46] H. Zhang, C. Q. Wu, S. Gao, Z. Wang, Y. Xu, and Y. Liu, "An Effective Deep Learning Based Scheme for Network Intrusion Detection," in 2018 24th International Conference on Pattern Recognition (ICPR), 2018: IEEE, pp. 682-687.
[47] D. Papamartzivanos, F. G. Mármol, and G. Kambourakis, "Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems," IEEE Access, vol. 7, pp. 13546-13560, 2019.
[48] C. Ieracitano et al., "Statistical Analysis Driven Optimized Deep Learning System for Intrusion Detection," in International Conference on Brain Inspired Cognitive Systems, 2018: Springer, pp. 759-769.
[49] N. T. Van, T. N. Thinh, and L. T. Sach, "An anomaly-based network intrusion detection system using Deep learning," in System Science and Engineering (ICSSE), 2017 International Conference on, 2017: IEEE, pp. 210-214.
[50] Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, "Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection," arXiv preprint arXiv:1802.09089, 2018.
[51] A. Javaid, Q. Niyaz, W. Sun, and M. Alam, "A deep learning approach for network intrusion detection system," in Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 2016: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 21-26.
[52] M. Ishaque and L. Hudec, "Feature extraction using Deep Learning for Intrusion Detection System," in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), 2019: IEEE, pp. 1-5.
[53] M. Al-Qatf, Y. Lasheng, M. Al-Habib, and K. Al-Sabahi, "Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection," IEEE Access, vol. 6, pp. 52843-52856, 2018.
[54] S. N. Mighan and M. Kahani, "Deep Learning Based Latent Feature Extraction for Intrusion Detection," in Electrical Engineering (ICEE), Iranian Conference on, 2018: IEEE, pp. 1511-1516.
[55] F. Farahnakian and J. Heikkonen, "A deep auto-encoder based approach for intrusion detection system," in Advanced Communication Technology (ICACT), 2018 20th International Conference on, 2018: IEEE, pp. 178-183.
[56] Y. Yu, J. Long, and Z. Cai, "Session-Based Network Intrusion Detection Using a Deep Learning Architecture," in Modeling Decisions for Artificial Intelligence, 2017: Springer, pp. 144-155.
[57] Q. Niyaz, W. Sun, and A. Y. Javaid, "A deep learning based DDoS detection system in software-defined networking (SDN)," arXiv preprint arXiv:1611.07400, 2016.
[58] A. Abeshu and N. Chilamkurti, "Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing," IEEE Communications Magazine, vol. 56, no. 2, pp. 169-175, 2018.
[59] N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, "A deep learning approach to network intrusion detection," IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41-50, 2018.
[60] P. V. Dinh, T. N. Ngoc, N. Shone, A. MacDermott, and Q. Shi, "Deep learning combined with de-noising data for network intrusion detection," in Intelligent and Evolutionary Systems (IES), 2017 21st Asia Pacific Symposium on, 2017: IEEE, pp. 55-60.
[61] M. Z. Alom and T. M. Taha, "Network intrusion detection for cyber security on neuromorphic computing system," in Neural Networks (IJCNN), 2017 International Joint Conference on, 2017: IEEE, pp. 3830-3837.
[62] C. Kim and J. Park, "Designing online network intrusion detection using deep auto-encoder Q-learning," Computers & Electrical Engineering, vol. 79, p. 106460, 2019.
[63] A. S. Qureshi, A. Khan, N. Shamim, and M. H. Durad, "Intrusion detection using deep sparse auto-encoder and self-taught learning," Neural Computing and Applications, pp. 1-13.
[64] T. Aldwairi, D. Perera, and M. A. Novotny, "An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection," Computer Networks, vol. 144, pp. 111-119, 2018.
[65] U. Fiore, F. Palmieri, A. Castiglione, and A. De Santis, "Network anomaly detection with the restricted Boltzmann machine," Neurocomputing, vol. 122, pp. 13-23, 2013.
[66] K. Alrawashdeh and C. Purdy, "Toward an online anomaly intrusion detection system based on deep learning," in Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on, 2016: IEEE, pp. 195-200.
[67] J. Yang, J. Deng, S. Li, and Y. Hao, "Improved traffic detection with support vector machine based on restricted Boltzmann machine," Soft Computing, vol. 21, no. 11, pp. 3101-3112, 2017.
[68] A. Elsaeidy, K. S. Munasinghe, D. Sharma, and A. Jamalipour, "Intrusion detection in smart cities using Restricted Boltzmann Machines," Journal of Network and Computer Applications, 2019.
[69] S. Otoum, B. Kantarci, and H. T. Mouftah, "On the Feasibility of Deep Learning in Sensor Network Intrusion Detection," IEEE Networking Letters, 2019.
[70] X. Zhang and J. Chen, "Deep learning based intelligent intrusion detection," in Communication Software and Networks (ICCSN), 2017 IEEE 9th International Conference on, 2017: IEEE, pp. 1133-1137.
[71] A. Gouveia and M. Correia, "A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection," in International Work-Conference on Artificial Neural Networks, 2017: Springer, pp. 432-446.
[72] M. Z. Alom and T. M. Taha, "Network intrusion detection for cyber security using unsupervised deep learning approaches," in Aerospace and Electronics Conference (NAECON), 2017 IEEE National, 2017: IEEE, pp. 63-69.
[73] W. Peng, X. Kong, G. Peng, X. Li, and Z. Wang, "Network Intrusion Detection Based on Deep Learning," in 2019 International Conference on Communications, Information System and Computer Engineering (CISCE), 2019: IEEE, pp. 431-435.
[74] Y. Zhang, P. Li, and X. Wang, "Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network," IEEE Access, vol. 7, pp. 31711-31722, 2019.
[75] N. Gao, L. Gao, Q. Gao, and H. Wang, "An intrusion detection model based on deep belief networks," in Advanced Cloud and Big Data (CBD), 2014 Second International Conference on, 2014: IEEE, pp. 247-252.
[76] M. Z. Alom, V. Bontupalli, and T. M. Taha, "Intrusion detection using deep belief networks," in Aerospace and Electronics Conference (NAECON), 2015 National, 2015: IEEE, pp. 339-344.
[77] J. Tian and P. A. Li, "An Intrusion Detection Algorithm of Dynamic Recursive Deep Belief Networks," in Proceedings of the 2017 International Conference on Information Technology, 2017: ACM, pp. 180-183.
[78] O. E. David and N. S. Netanyahu, "Deepsign: Deep learning for automatic malware signature generation and classification," in Neural Networks (IJCNN), 2015 International Joint Conference on, 2015: IEEE, pp. 1-8.
[79] M. A. Salama, H. F. Eid, R. A. Ramadan, A. Darwish, and A. E. Hassanien, "Hybrid intelligent intrusion detection scheme," in Soft computing in industrial applications: Springer, 2011, pp. 293-303.
[80] Y. Yang, K. Zheng, C. Wu, X. Niu, and Y. Yang, "Building an effective intrusion detection system using the modified density peak clustering algorithm and deep belief networks," Applied Sciences, vol. 9, no. 2, p. 238, 2019.
[81] G. Thamilarasu and S. Chawla, "Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things," Sensors, vol. 19, no. 9, p. 1977, 2019.
[82] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, "Deep recurrent neural network for intrusion detection in sdn-based networks," in 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), 2018: IEEE, pp. 202-206.
[83] A. Tuor, S. Kaplan, B. Hutchinson, N. Nichols, and S. Robinson, "Deep learning for unsupervised insider threat detection in structured cybersecurity data streams," arXiv preprint arXiv:1710.00811, 2017.
[84] K. Al Jallad, M. Aljnidi, and M. S. Desouki, "Big data analysis and distributed deep learning for next-generation intrusion detection system optimization," Journal of Big Data, vol. 6, no. 1, p. 88, 2019.
[85] B. Roy and H. Cheung, "A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network," in 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), 2018: IEEE, pp. 1-6.
[86] C. Yin, Y. Zhu, J. Fei, and X. He, "A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks," IEEE Access, vol. 5, pp. 21954-21961, 2017.
[87] G. Loukas, T. Vuong, R. Heartfield, G. Sakellari, Y. Yoon, and D. Gan, "Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning," IEEE Access, vol. 6, pp. 3491-3508, 2018.
[88] X. Yuan, C. Li, and X. Li, "DeepDefense: Identifying DDoS Attack via Deep Learning," in Smart Computing (SMARTCOMP), 2017 IEEE International Conference on, 2017: IEEE, pp. 1-8.
[89] F. Jiang et al., "Deep Learning based Multi-channel intelligent attack detection for Data Security," IEEE Transactions on Sustainable Computing, 2018.
[90] S. M. Kasongo and Y. Sun, "A Deep Long Short-Term Memory based classifier for Wireless Intrusion Detection System," ICT Express, 2019.
[91] S. Kaur and M. Singh, "Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks," Neural Computing and Applications, pp. 1-19.
[92] K. Yang, J. Liu, C. Zhang, and Y. Fang, "Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems," in MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 2018: IEEE, pp. 559-564.
[93] C. Xu, J. Shen, X. Du, and F. Zhang, "An intrusion detection system using a deep neural network with gated recurrent units," IEEE Access, vol. 6, pp. 48697-48707, 2018.
[94] R. Vinayakumar, M. Alazab, K. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, "Deep Learning Approach for Intelligent Intrusion Detection System," IEEE Access, vol. 7, pp. 41525-41550, 2019.
[95] V. K. Rahul, R. Vinayakumar, K. Soman, and P. Poornachandran, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security," in 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2018: IEEE, pp. 1-6.
[96] J.-h. Woo, J.-Y. Song, and Y.-J. Choi, "Performance Enhancement of Deep Neural Network Using Feature Selection and Preprocessing for Intrusion Detection," in 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2019: IEEE, pp. 415-417.
[97] S. Behera, A. Pradhan, and R. Dash, "Deep Neural Network Architecture for Anomaly Based Intrusion Detection System," in 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN), 2018: IEEE, pp. 270-274.
[98] A. Malathi, J. Amudha, and P. Narayana, "A Prototype to Detect Anomalies Using Machine Learning Algorithms and Deep Neural Network," in Computational Vision and Bio Inspired Computing: Springer, 2018, pp. 1084-1094.
[99] L. F. Maimó, Á. L. P. Gómez, F. J. G. Clemente, M. G. Pérez, and G. M. Pérez, "A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks," IEEE Access, vol. 6, pp. 7700-7712, 2018.
[100] B. Hu, J. Wang, Y. Zhu, and T. Yang, "Dynamic Deep Forest: An Ensemble Classification Method for Network Intrusion Detection," Electronics, vol. 8, no. 9, p. 968, 2019.
[101] Y. Yang, K. Zheng, C. Wu, and Y. Yang, "Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network," Sensors, vol. 19, no. 11, p. 2528, 2019.
[102] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, "Deep learning approach for network intrusion detection in software defined networking," in Wireless Networks and Mobile Communications (WINCOM), 2016 International Conference on, 2016: IEEE, pp. 258-263.
[103] K. Arora and R. Chauhan, "Improvement in the performance of deep neural network model using learning rate," in Power and Advanced Computing Technologies (i-PACT), 2017 Innovations in, 2017: IEEE, pp. 1-5.
[104] S. McElwee, J. Heaton, J. Fraley, and J. Cannady, "Deep learning for prioritizing and responding to intrusion detection alerts," in Military Communications Conference (MILCOM), MILCOM 2017-2017 IEEE, 2017: IEEE, pp. 1-5.
[105] W. Wang et al., "HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection," IEEE Access, vol. 6, pp. 1792-1806, 2018.
[106] K. Amarasinghe and M. Manic, "Improving User Trust on Deep Neural Networks based Intrusion Detection Systems," in IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, 2018: IEEE, pp. 3262-3268.
[107] S. S. Roy, A. Mallik, R. Gulati, M. S. Obaidat, and P. Krishna, "A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection," in International Conference on Mathematics and Computing, 2017: Springer, pp. 44-53.
[108] J. Kim, N. Shin, S. Y. Jo, and S. H. Kim, "Method of intrusion detection using deep neural network," in Big Data and Smart Computing (BigComp), 2017 IEEE International Conference on, 2017: IEEE, pp. 313-316.
[109] M.-J. Kang and J.-W. Kang, "A novel intrusion detection method using deep neural network for in-vehicle network security," in Vehicular Technology Conference (VTC Spring), 2016 IEEE 83rd, 2016: IEEE, pp. 1-5.
[110] S. Potluri and C. Diedrich, "Accelerated deep neural networks for enhanced Intrusion Detection System," in Emerging Technologies and Factory Automation (ETFA), 2016 IEEE 21st International Conference on, 2016: IEEE, pp. 1-8.
[111] S. A. Ludwig, "Intrusion detection of multiple attack classes using a deep neural net ensemble," in Computational Intelligence (SSCI), 2017 IEEE Symposium Series on, 2017: IEEE, pp. 1-7.
[112] X. Jin, B. Cui, J. Yang, and Z. Cheng, "Payload-Based Web Attack Detection Using Deep Neural Network," in International Conference on Broadband and Wireless Computing, Communication and Applications, 2017: Springer, pp. 482-488.
[113] B. Kolosnjaji, A. Zarras, G. Webster, and C. Eckert, "Deep learning for classification of malware system call sequences," in Australasian Joint Conference on Artificial Intelligence, 2016: Springer, pp. 137-149.
[114] B. A. Tama and K.-H. Rhee, "Attack Classification Analysis of IoT Network via Deep Learning Approach."
[115] Y. Peng, J. Su, X. Shi, and B. Zhao, "Evaluating Deep Learning Based Network Intrusion Detection System in Adversarial Environment," in 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), 2019: IEEE, pp. 61-66.
[116] O. Faker and E. Dogdu, "Intrusion Detection Using Big Data and Deep Learning Techniques," in Proceedings of the 2019 ACM Southeast Conference, 2019: ACM, pp. 86-93.
[117] F. A. Khan, A. Gumaei, A. Derhab, and A. Hussain, "A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection," IEEE Access, vol. 7, pp. 30373-30385, 2019.
[118] W. Tao, W. Zhang, C. Hu, and C. Hu, "A Network Intrusion Detection Model Based on Convolutional Neural Network," in International Conference on Security with Intelligent Computing and Big-data Services, 2018: Springer, pp. 771-783.
[119] K. Wu, Z. Chen, and W. Li, "A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks," IEEE Access, vol. 6, pp. 50850-50859, 2018.
[120] K. Kanagaraj, S. Swamynathan, and A. Karthikeyan, "Cloud Enabled Intrusion Detector and Alerter Using Improved Deep Learning Technique," in International Conference on Intelligent Information Technologies, 2018: Springer, pp. 17-29.
[121] S. Potluri, S. Ahmed, and C. Diedrich, "Convolutional Neural Networks for Multi-class Intrusion Detection System," in International Conference on Mining Intelligence and Knowledge Exploration, 2018: Springer, pp. 225-238.
[122] Y. Zeng, H. Gu, W. Wei, and Y. Guo, "$ Deep-Full-Range $: A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework," IEEE Access, vol. 7, pp. 45182-45190, 2019.
[123] W.-H. Lin, H.-C. Lin, P. Wang, B.-H. Wu, and J.-Y. Tsai, "Using convolutional neural networks to network intrusion detection for cyber threats," in 2018 IEEE International Conference on Applied System Invention (ICASI), 2018: IEEE, pp. 1107-1110.
[124] C.-M. Hsu, H.-Y. Hsieh, S. W. Prakosa, M. Z. Azhari, and J.-S. Leu, "Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detection," in International Wireless Internet Conference, 2018: Springer, pp. 86-94.
[125] Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, "An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks," IEEE Access, vol. 7, pp. 42210-42219, 2019.
[126] S. Z. Lin, Y. Shi, and Z. Xue, "Character-Level Intrusion Detection Based On Convolutional Neural Networks," in 2018 International Joint Conference on Neural Networks (IJCNN), 2018: IEEE, pp. 1-8.
[127] W. Wang, M. Zhu, J. Wang, X. Zeng, and Z. Yang, "End-to-end encrypted traffic classification with one-dimensional convolution neural networks," in Intelligence and Security Informatics (ISI), 2017 IEEE International Conference on, 2017: IEEE, pp. 43-48.
[128] J. Saxe and K. Berlin, "eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys," arXiv preprint arXiv:1702.08568, 2017.
[129] W. Wang, M. Zhu, X. Zeng, X. Ye, and Y. Sheng, "Malware traffic classification using convolutional neural network for representation learning," in Information Networking (ICOIN), 2017 International Conference on, 2017: IEEE, pp. 712-717.
[130] M. M. U. Chowdhury, F. Hammond, G. Konowicz, C. Xin, H. Wu, and J. Li, "A few-shot deep learning approach for improved intrusion detection," in Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017 IEEE 8th Annual, 2017: IEEE, pp. 456-462.
[131] H. Yang, L. Cheng, and M. C. Chuah, "Deep-Learning-Based Network Intrusion Detection for SCADA Systems," in 2019 IEEE Conference on Communications and Network Security (CNS), 2019: IEEE, pp. 1-7.
[132] Y. Zeng, M. Qiu, D. Zhu, Z. Xue, J. Xiong, and M. Liu, "DeepVCM: A Deep Learning Based Intrusion Detection Method in VANET," in 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), 2019: IEEE, pp. 288-293.
[133] J. Bassey, D. Adesina, X. Li, L. Qian, A. Aved, and T. Kroecker, "Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning," in 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), 2019: IEEE, pp. 98-104.
[134] H. M. Song, J. Woo, and H. K. Kim, "In-vehicle network intrusion detection using deep convolutional neural network," Vehicular Communications, p. 100198, 2019.