Author:
Yao JingTao,Zhao Songlun,Fan Lisa
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Bace, R.G.: Intrusion Detection. Macmillan Technical Publishing (2000)
2. Burge, C.: A Tutorial on Support Vector Machines for Pattern Recognition. Data mining and knowledge discovery journal 2, 121–167 (1998)
3. Dasarathy, B.V.: Intrusion detection. Information Fusion 4, 243–245 (2003)
4. Frakes, W.B., Baeza-Yates, R., Ricardo, B.Y.: Information Retrieval: Data Structures and Algorithms. Prentice-Hall, Englewood Cliffs (1992)
5. Lecture Notes in Artificial Intelligence;J.C. Han,2005
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Multi-Resolution Analysis with Visualization to Determine Network Attack Patterns;Applied Sciences;2023-03-16
2. Verification Based Scheme to Restrict IoT Attacks;2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies (BDCAT '21);2021-12-06
3. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks;Sensors;2021-01-10
4. Application of Computational Intelligence in Network Intrusion Detection;Research Anthology on Multi-Industry Uses of Genetic Programming and Algorithms;2021
5. SON KULLANICILAR İÇİN ANOMALİ SALDIRI TESPİT SİSTEMLERİ;Eskişehir Osmangazi Üniversitesi Mühendislik ve Mimarlık Fakültesi Dergisi;2019-12-15