Author:
Salih Abdulrahman,Ma Xiaoqi,Peytchev Evtim
Publisher
Springer International Publishing
Reference20 articles.
1. Bahaman, N., Anton Satria, P., & Mas’ud, Z. (2011). Implementation of IPv6 network testbed: Intrusion detection system on transition mechanism. Journal of Applied Sciences, 11(1), 118–124.
2. Chen, S. H., Jakeman, A. J., & Norton, J. P. (2008). Artificial intelligence techniques: An introduction to their use for modelling environmental systems. Mathematics and Computers in Simulation, 78(2), 379–400.
3. Choudhary, A. R. (2009, November). In-depth analysis of IPv6 security posture. In 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.
4. Fries, T. P. (2008, July). A fuzzy-genetic approach to network intrusion detection. In Proceedings of the 10th Annual Conference Companion on Genetic and Evolutionary Computation (pp. 2141–2146). ACM.
5. Gomez, J., & Dasgupta, D. (2002, June). Evolving fuzzy classifiers for intrusion detection. In Proceedings of the 2002 IEEE Workshop on Information Assurance (Vol. 6, No. 3, pp. 321–323). New York: IEEE Computer Press.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mediation Model of Service Quality and Behavioural Intention to Use of Artificial Intelligence Security Technology in UAE;International Journal of Sustainable Construction Engineering and Technology;2023-05-08
2. Defense and Evaluation Against Covert Channel-Based Attacks in Android Smartphones;Data Management, Analytics and Innovation;2023
3. CC-Guard: An IPv6 Covert Channel Detection Method Based on Field Matching;2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2022-12
4. Efficiently Secure Data Communications Based on CBC-RC6 and the Overflow Field of Timestamp Option in an IPv4 Packet;Informatica;2022-09-05
5. Code Layering for the Detection of Network Covert Channels in Agentless Systems;IEEE Transactions on Network and Service Management;2022-09