Author:
Singh C. Edwin,Singh J. Amar Pratap
Publisher
Springer International Publishing
Reference27 articles.
1. Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad Hoc Networks,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (ACM MobiCom’00), Boston, MA, pp. 275–283, Aug. 2000.
2. Y. Huang, W. Fan, W. Lee, and P. S. Yu, “Cross-Feature Analysis for Detecting Ad-hoc Routing Anomalies,” Proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, RI, pp. 478–487, May 2003.
3. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cybersecurity intrusion detection.” IEEE Communications Surveys Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016.
4. Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access,5, 21954–21961.
5. Tao Ma, Fen Wang, Jianjun Cheng, Yang Yu, and Xiaoyun Chen. A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Sensors, 16(10), 2016.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献