Author:
Mekemte Lea Astrid Kenmogne,Chalhoub Gerard
Publisher
Springer Nature Switzerland
Reference20 articles.
1. Díaz-Verdejo, J., Muñoz-Calle, J., Estepa Alonso, A., Estepa Alonso, R., Madinabeitia, G.: On the detection capabilities of signature-based intrusion detection systems in the context of web attacks. Appl. Sci. 12, 852 (2022)
2. Pinto, A., Herrera, L.-C., Donoso, Y., Gutierrez, J.A.: Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure. Sensors 23, 2415 (2023)
3. Khraisat, A., Gondal, I., Vamplew, P., et al.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2, 20 (2019)
4. Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey. Managing Cyber Threats (5), 19–78 (2005)
5. Singh, D., Singh, V.P.: Comparative study of various distributed intrusion detection systems for WLAN. Global J. Res. Eng. Electr. Electron 6(12), 49–56 (2012)