Publisher
Springer International Publishing
Reference24 articles.
1. Schapire, R.E.: The strength of weak learnability. Mach. Learn. 5(2), 197–227 (1990)
2. Zhang, J., Zulkernine, M., Haque, A.: Random-Forests-based network intrusion. IEEE Trans. Syst. Man Cybern.—Part C: Appl. Rev. 38, 649–659 (2008)
3. Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). Department of Commerce, National Institute of Standards and Technology, Gaithersburg (2007)
4. Hansen, L., Salomon, P.: Neural network ensembles. IEEE Trans. Pattern Anal. Mach. Intell. 12, 993–1001 (1990)
5. Gang, W., Jinxing, H., Jian, M.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(2011), 6225–6232 (2014)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Novel Approach for Anomaly Detection using Snort Integrated with Machine Learning;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
2. Anomaly Detection In Network Traffic: A Review;2023 Seventh International Conference on Image Information Processing (ICIIP);2023-11-22