Author:
Wang Xingyu,Bao Huaifeng,Li Wenhao,Chen Haoning,Wang Wen,Liu Feng
Publisher
Springer Nature Switzerland
Reference24 articles.
1. Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., Ahmad, F.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021)
2. Albin, E., Rowe, N.C.: A realistic experimental comparison of the suricata and snort intrusion-detection systems. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 122–127. IEEE (2012)
3. Ariu, D., Tronci, R., Giacinto, G.: Hmmpayl: an intrusion detection system based on hidden Markov models. Comput. Secur. 30(4), 221–241 (2011)
4. Arp, D., et al.: Dos and don’ts of machine learning in computer security. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 3971–3988 (2022)
5. Lecture Notes in Computer Science;H Bao,2023