Author:
Yinka-Banjo Chika,Alli Pwamoreno,Misra Sanjay,Oluranti Jonathan,Ahuja Ravin
Publisher
Springer International Publishing
Reference28 articles.
1. Abdulbasit A, Alexei L, Clare D (2011) A misuse-based network intrusion detection system using temporal logic and stream processing. In: International conference on network and system security, pp 1–8
2. Aleksandar M, Marco V, Samuel K, Alberto A, Bryan DP (2017) Evaluating computer intrusions detection systems: a survey of common practices. Res Group Stand Perform Eval Corpor 48(1), Article 12. https://doi.org/10.1145/2808691
3. Alex D (2012) Intrusion detection using VProbes. Mass Inst Technol 1(2):28–31
4. Alia Y, Eric A (2018) Network intrusion dataset used in network security education. Int J Integr Technol Educ 7(3):43–50
5. Alireza H, Hossein S, Ahmad K (2006) A new framework: anomaly detection with snort intrusion detection system. In: Workshop on information technology and its disciplines
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Zero-shot learning for raw network traffic detection;Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications VI;2024-06-07
2. Analyzing the Efficacy of Machine Learning Algorithms on Intrusion Detection Systems;Advances in Information Security, Privacy, and Ethics;2024-02-23
3. NCGTM: A Noncooperative Game-Theoretic Model to Assist IDS in Cloud Environment;IEEE Transactions on Industrial Informatics;2023
4. The Application of Cyclostationary Malware Detection Using Boruta and PCA;Computer Networks and Inventive Communication Technologies;2022-10-14