Author:
Qu Xiaofei,Yang Lin,Guo Kai,Ma Linru,Sun Meng,Ke Mingxing,Li Mu
Funder
There are no Funding Sources
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference92 articles.
1. Denning DE (1987) An intrusion detection model. IEEE Trans Softw Eng (Special issue on Computer Security and Privacy) 13(2):222–232
2. Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10:1–35
3. De la Hoz E, De la Hoz E, Ortiz A, Ortega J, Prieto B (2015) PCA filtering and probabilistic SOM for network intrusion detection. Advances in Computational Intelligence in Elsevier Neurocomputing 164:71–81
4. Zhisheng W, Xiaobing X (2013) An improved adaptive self-organizing map. Comput Eng Appl 49(17):112–115
5. Hoglund AJ, Hatonen K, Sorvari AS (2000) A computer host-based user anomaly detction system using the self-organizing map. Proceedings of the IEEEINNS-ENNS International Joint Conference on Neural Networks (IJCNN00) 5:24–27
Cited by
68 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献