Publisher
Springer International Publishing
Reference47 articles.
1. Aggarwal, C.C.: Outlier Analysis, 2nd edn. Springer, New York (2017).
https://doi.org/10.1007/978-1-4614-6396-2
2. Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)
3. Amor, N.B., Benferhat, S., Elouedi, Z.: Naive bayes vs decision trees in intrusion detection systems. In: SAC, pp. 420–424. ACM (2004)
4. Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James p. Anderson Co., Fort Washington (1980)
5. Bhamare, D., Salman, T., Samaka, M., Erbad, A., Jain, R.: Feasibility of supervised machine learning for cloud security. CoRR abs/1810.09878 (2018)
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献