Author:
Kharitonov Aleksei,Zimmermann Axel
Publisher
Springer International Publishing
Reference45 articles.
1. Albayrak, S., Scheel, C., Milosevic, D., Muller, A.: Combining self-organizing map algorithms for robust and scalable intrusion detection. In: International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’06), vol. 2, pp. 123–130, November 2005. https://doi.org/10.1109/CIMCA.2005.1631456
2. Alghushairy, O., Alsini, R., Soule, T., Ma, X.: A review of local outlier factor algorithms for outlier detection in big data streams. Big Data Cogn. Comput. 5(1) (2021). https://doi.org/10.3390/bdcc5010001
3. Arregoces, M., Portolani, M.: Data Center Fundamentals. Cisco Press, Indianapolis (2003)
4. Axelsson, S.: Intrusion detection systems: a survey and taxonomy. Technical report (2000). http://www1.cs.columbia.edu/~locasto/projects/candidacy/papers/axelsson00intrusion.pdf. Accessed 20 Mar 2021
5. Belenguer, J., Calafate, C.T.: A low-cost embedded ids to monitor and prevent man-in-the-middle attacks on wired LAN environments. In: The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007), pp. 122–127, October 2007. https://doi.org/10.1109/SECUREWARE.2007.4385321
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献