Author:
Mkuzangwe Nenekazi Nokuthala Penelope,Nelwamondo Fulufhelo Vincent
Publisher
Springer International Publishing
Reference19 articles.
1. Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. J. 10, 1–35 (2010)
2. Chin-Ling, C.: A new detection method for distributed denial of service attack traffic based on statistical test. J. Univ. Comput. Sci. 15, 488–503 (2009)
3. Amor, N.B., Benferhat, S., Elouedi, Z.: Naive Bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420–424. ACM (2004)
4. Kanwal, G., Rshma, C.: Detection of DDoS attacks using data mining. Int. J. Comput. Bus. Res. (IJCBR) 2, 1–10 (2011)
5. Tuncer, T., Tatar, Y.: Detection SYN flooding attacks using fuzzy logic. In: Proceedings of the International Conference on Information Security and Assurance, ISA 2008, pp. 321–325. IEEE (2008)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhanced cloud security: a novel intrusion detection system using ARSO algorithm and Bi-LSTM classifier;International Journal of Information Technology;2024-05-04
2. Intrusion Detection System Trends: An Overview of Current Advances in IoV & Communication Networks;IFIP Advances in Information and Communication Technology;2024
3. Cyber Security System Using Fuzzy Logic;2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME);2023-07-19
4. On detecting distributed denial of service attacks using fuzzy inference system;Cluster Computing;2022-08-03
5. Design of Network Forensics Labs for Teaching-oriented Institutions;2021 International Conference on Computational Science and Computational Intelligence (CSCI);2021-12