Publisher
Springer International Publishing
Reference36 articles.
1. Benqdara S (2018) Anomaly intrusion detection system based on unlabeled data. Int J Comput Appl 181(25):18–26
2. Gavrilis D, Dermatas E (2005) Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Comput Netw 48(2):235–245. ISSN 1389-1286.
https://doi.org/10.1016/j.comnet.2004.08.014
3. Eskin E (2000) Anomaly detection over noisy data using learned probability distribu-tions. In Proceedings of the seventeenth international conference on machine learning (ICML-2000), June 29–July 2, 2000, Stanford University. Kaufmann, San Francisco, pp 255–262.
https://doi.org/10.7916/D8C53SKF
4. Este A, Gringoli F, Salgarelli L (2009) Support vector machines traffic classifi-cation. Comput Netw 53(14):2476–2490.
https://doi.org/10.1016/j.comnet.2009.05.003
5. Paliwal S, Gupta R (2012) Denial-of-Service, Probing & Remote to User (R2L) attack detection using genetic algorithm. Int J Comput Appl (0975–8887), 60(19):57–62
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献