Author:
Deshpande Prachi,Sharma S. C.,Peddoju S. K.,Junaid S.
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Safety, Risk, Reliability and Quality
Reference23 articles.
1. Abraham A, Grosan C, Martin-Vide C (2007) Evolutionary design of intrusion detection programs. Int J Netw Secur 4(3):328–339
2. Aggarwal C, Zhai C (2012) A survey of text classification algorithms. In: Mining Text Data. New york, Springer 163–222
3. Anderson J (1980) Computer security threat monitoring and surveillance, Technical report. James P. Anderson Co., Fort Washington
4. Barbhuiya F et al (2011) An active host-based intrusion detection system for ARP-related attacks and its verification. Int J Net Sec App 3(3):163–180
5. Cai L, Chen J, Ke Y, Chen T, Li Z (2010) A new data normalization method for unsupervised anomaly intrusion detection. J Zhejiang Uni-SCI C 11(10):778–784
Cited by
93 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献