Author:
Gaikwad Dwarkoba,Thool Ravindra
Publisher
Springer International Publishing
Reference18 articles.
1. Tsai, C.-F., Hsu, Y.-F., Lin, C.-Y., Lin, W.-Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36, 11994–12000 (2009)
2. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. In: IEEE Communications Survey and Tutorials, vol. 16(1), First Quarter (2014)
3. Basics of Intrusion detection system,
www.sans.org/readingroom/whitepapers/detection
4. Major Types of IDS,
http://advancednetworksecurity
5. Arun Raj Kumar, P., Selvakumar, S.: Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Comput. Commun. 36, 303–319 (2013)
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献