Publisher
Springer Nature Switzerland
Reference28 articles.
1. ETSI ETR 332: Security techniques advisory group (STAG). Security requirements capture (1996)
2. Wen, W., Shang, C., Dong, Z., Keh, H.C., Roy, D.S.: An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks. Int. J. Ad Hoc Ubiq. Comput. 36(1), 20–31 (2021)
3. Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1–22 (2019). https://doi.org/10.1186/s42400-019-0038-7
4. Wanda, P.: A survey of intrusion detection system. Int. J. Inf. Comput. 1(1), 1 (2020)
5. Sobh, T.S.: Wired and wireless intrusion detection system: classifications, good characteristics and state-ofthe-art. Comput. Stand. Interfaces 28(6), 670–694 (2006)