Author:
Yu Yang,Long Jun,Liu Fang,Cai Zhiping
Publisher
Springer International Publishing
Reference66 articles.
1. Ahmed, M., Naser Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)
2. Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and big heterogeneous data: a survey. J. Big Data 2, 1–41 (2015)
3. Ektefa, M., Memar, S., Sidi, F., Affendey, L.S.: Intrusion detection using data mining techniques. In: International Conference on Information Retrieval & Knowledge Management, pp. 1–14 (2010)
4. Nguyen, H.: Reliable machine learning algorithms for intrusion detection systems. Ph.D. thesis, Faculty of Computer Science and Media Technology Gjøvik University College (2012). http://hdl.handle.net/11250/144371 . Accessed August 2015, 2.3. 2, 2.4. 2, 2, 5.3. 3
5. Farah, N., Avishek, M., Muhammad, F., Rahman, A., Rafni, M., Md, D.: Application of machine learning approaches in intrusion detection system: a survey. Int. J. Adv. Res. Artif. Intell. 4, 9–18 (2015)
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献