Author:
Sangeethapriya N.,Bharathi L.,Jagan Mohan Rao S.,Harisha A. N. L.
Publisher
Springer International Publishing
Reference24 articles.
1. Borji, A. (2007). Combining heterogeneous classifiers for network intrusion detection. In Advances in computer science - ASIAN 2007. Computer and network security (pp. 254–260).
2. Zouari, H., Heutte, L., Lecourtier, Y., & ALimi, A. (2002). “Un panorama des méithodes de combinaison de classifieurs en reconnaissance de formes”, (French) [An overview of classifier combination methods in pattern recognition]. In Proceedings of the RFIA'2002 (Vol. 2, pp. 499–508).
3. Zhang, Y., Han, Z., & Ren, J. (2009). A network anomaly detection method based on relative entropy theory. In Second international symposium on electronic commerce and security (pp. 231–235).
4. Hamamoto, A. H., Carvalho, A., Sampaio, L. D. H., Abrao, L., & Mario, T. L. P. (2018). Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Systems with Applications, 92, 390–402.
5. Paz, J. S., & Roman, D. T. (2015). On entropy in network traffic anomaly detection. In 2nd international electronic conference on entropy and its applications.