Author:
Hanane Chliah,Amal Battou
Publisher
Springer Nature Switzerland
Reference10 articles.
1. Edgar, T.W., Manz, D.O.: Science and Cyber Security. In: Research Methods for Cyber Security, pp. 33–62. Elsevier (2017). https://doi.org/10.1016/B978-0-12-805349-2.00002-9
2. Dixit, P., Silakari, S.: Deep learning algorithms for cybersecurity applications: a technological and status review. Comput. Sci. Rev. 39, 100317 (2021). https://doi.org/10.1016/j.cosrev.2020.100317
3. Hariharan, A., Gupta, A., Pal, T.: CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection, ArXiv190710442 Cs, juill. 2019, Consulté le: 3 mars 2022. [En ligne]. Disponible sur: http://arxiv.org/abs/1907.10442
4. Pareta, P., Rai, M., Gangwar, M.: An integrated approach for effective intrusion detection with elasticsearch. Int. J. Sci. Res. Comput. Sci. Eng. 6(3), 13–17 (2018). https://doi.org/10.26438/ijsrcse/v6i3.1317
5. Mink, D.M., et al.: Near-real-time IDS for the U.S. FAA’s NextGen ADS-B. Big Data Cogn. Comput. 5(2), 27 (2021). https://doi.org/10.3390/bdcc5020027