Author:
Amraoui Noureddine,Besrour Amine,Ksantini Riadh,Zouari Belhassen
Publisher
Springer International Publishing
Reference12 articles.
1. Crocker, P.: Smarter authentication makes mobile experiences more secure, user friendly.
https://www.computerworld.com/article/3181710/mobile-wireless/smarter-authentication-makes-mobile-experiences-more-secure-user-friendly.html
2. Garcia-Font, V., Garrigues, C., Rifà-Pous, H.: A comparative study of anomaly detection techniques for smart city wireless sensor networks. Sens. J. 16, 868 (2016)
3. Haim, B., Menahem, E., Wolfsthal, Y., Meenan, C.: Visualizing insider threats: an effective interface for security analytics. In: 22nd ACM International Conference on Intelligent User Interfaces Companion, pp. 39–42 (2017)
4. Liao, Q., Li, H., Kang, S., Liu, C.: Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching. Secur. Commun. Netw. J 8, 3111–3120 (2015)
5. Mathew, S., Petropoulos, M., Ngo, H.Q., Upadhyaya, S.: A data-centric approach to insider attack detection in database systems. In: 13th International Workshop on Recent Advances in Intrusion Detection, pp. 382–401, Berlin (2010)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献