Author:
Zong Wei,Chow Yang-Wai,Susilo Willy
Publisher
Springer International Publishing
Reference18 articles.
1. Angelini, M., Prigent, N., Santucci, G.: PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics. In: Harrison, L., Prigent, N., Engle, S., Best, D.M. (eds.), 2015 IEEE Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, 25 October 2015, pp. 1–8. IEEE Computer Society (2015)
2. Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)
3. de la Hoz Correa, E., de la Hoz Franco, E., Ortiz, A., Ortega, J., Prieto, B.: PCA filtering and probabilistic SOM for network intrusion detection. Neurocomputing 164, 71–81 (2015)
4. Javaid, A.Y., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. ICST Trans. Secur. Saf. 3(9), e2 (2016)
5. Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: Yavatkar, R., Zegura, E.W., Rexford, J. (eds.), Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Portland, Oregon, USA, 30 August–3 September 2004, pp. 219–230. ACM (2004)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献