1. Grossi, E. and Buscema, M.Introduction to artificial neural networks. European journal of gastroenterology & hepatology, vol. 19, no. 12, pp. 1046-1054, 2007. 2. Grossberg S.Nonlinear neural networks: Principles, mechanisms, and architectures. Neural networks, vol. 1, no. 1, pp. 17-61, 1988. 3. Bishop M.What is computer security? IEEE Security Privacy, vol. 1, no. 1, pp. 67-69, 2003. 4. Kang, M.J. and Kang, J.W.Intrusion Detection System Using Deep Neural Network for in-vehicle Network Security. PloS one, vol. 11, no. 6, pp. e0155781, 2016. 5. Vollmer, T. and Manic, M.Computationally Efficient Neural Network Intrusion Security Awareness. In2009 2nd International Symposium on Resilient Control Systems. IEEE, pp. 25-30, 2009. 6. Xie P., Bilenko M., Finley T., Gilad-Bachrach, R., Lauter, K., and Naehrig, M. Crypto-nets: Neural Networks Over Encrypted Data.arXiv preprint arXiv:1412.6181, 2014. 7. Mac H., Truong D., Nguyen L., Nguyen H., Tran H.A., andTran D.Detecting Attacks on Web Applications Using Autoencoder. InProceedings of the ninth international symposium on information and communication technology, pp. 416-421, 2018. 8. Yousefi-Azar, M., Varadharajan, V., Hamey, L., and Tupakula, U. Autoencoder-based Feature Learning for Cyber Security Applications. In2017 International joint conference on neural networks (IJCNN). IEEE, pp. 3854-3861, 2017. 9. Bojarski M.,Del Testa, D., Dworakowski, D., Firner, B., Flepp, B., Goyal, P., Jackel, L.D., Monfort, M., Muller, U., Zhang, J., and Zhang, X. End to End Learning for Self-driving Cars.arXiv preprint arXiv:1604.07316, 2016. 10. Daemen, J. and Rijmen, V.The Advanced Encryption Standard Process. In The Design of Rijndael. Springer, Berlin, Heidelberg, pp. 1-8, 2002. 11. More, S. and Bansode, R.Implementation of AES with Time Complexity Measurement for Various Input. Global Journal of Computer Science and Technology: E Network, Web & Security, vol. 15, no. 4, 2015. 12. Mishra, M. and Srivastava, M.A View of Artificial Neural Network. In2014 International Conference on Advances in Engineering & Technology Research (ICAETR-2014), IEEE, pp. 1-3, 2014. 13. Lee, D.H. and Lee, J.J.Evolving Artificial Neural Network Using Simple Augmenting Weight Matrix Method. In2008 6th IEEE International Conference on Industrial Informatics, IEEE, pp. 401-405, 2008. 14. Su N., Zhang Y., andLi M.Research on Data Encryption Standard Based on Aes Algorithm in Internet of Things Environment. In2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), IEEE, pp. 2071-2075, 2019. 15. Abdullah A.M.Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data.Cryptography and Network Security, vol. 16, pp. 1-11, 2017. 16. Selvakumar, A.L. and Ganadhas, C.S.The Evaluation Report of Sha-256 Crypt Analysis Hash Function. In2009 International Conference on Communication Software and Networks. IEEE, pp. 588-592, 2009. 17. Jeong, C. and Kim, Y.Implementation of Efficient Sha-256 Hash Algorithm for Secure Vehicle Communication Using FPGA. In2014 International SoC Design Conference (ISOCC). IEEE, pp. 224-225, 2014. |