Author:
Bajpai Sanchika Abhay,Patankar Archana B.
Publisher
Springer Science and Business Media LLC
Reference44 articles.
1. Bai, Y., Kobayashi, H.: Self-configuring intrusion detection System: Technology &Development. In: Proceedings of the17th International Conference on Advanced formation Networking and Applications (AINA’03), pp. 710–715 (2003)
2. Murali, A., Rao, M.: A Survey on Self-configuring intrusion detection Approaches. First International Conference on Information and Communication Technologies, ICICT 2005. IEEE, pp 233–240 (2005)
3. Sonawane, S., Karsoliya, S., Saurabh, P., Verma, B.: Self configuringSelf-configuring intrusion detection system. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks, IEEE, pp. 757–761 (2012)
4. Bamakan, S.M.H., Wang, H., Yingjie, T., Shi, Y.: An effective Self-configuring intrusion detection framework based on mclp/svm optimized by time-varying chaos particle swarm optimization. Neurocomputing 199, 90–102 (2016)
5. Luo, B., Xia, J.: A novel Self-configuring intrusion detection system based on feature generation with visualization strategy. Expert Syst. Appl. 41(9), 4139–4147 (2014)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献