Publisher
Springer International Publishing
Reference18 articles.
1. Das, R., Morris, T.H.: Machine learning and cyber security. In: 2017 ICCECE, pp. 1–7. IEEE (2017)
2. Dawood, H.A.: Graph theory and cyber security. In: 3rd International Conference on ACSAT, pp. 90–96. IEEE (2014)
3. Ford, V., Siraj, A.: Applications of machine learning in cyber security. In: Proceedings of the 27th International Conference on CAINE-2014 (2014)
4. Garcia, S., Grill, M., Stiborek, J., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. 45, 100–123 (2014)
5. Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)