Author:
Ghazy Rania A.,El-Rabaie El-Sayed M.,Dessouky Moawad I.,El-Fishawy Nawal A.,El-Samie Fathi E. Abd
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference16 articles.
1. Sen, S. (2015). A survey of intrusion detection systems using evolutionary computation. In X. S. Yang, S. F. Chien, & T. O. Ting (Eds.), Bio-inspired computation on telecommunication (pp. 73–94). Burlington: Morgan Kaufmann.
2. Gyanchandani, M., Yadav, R. N., & Rana, J. L. (2010). Intrusion detection using C4. 5: performance enhancement by classifier combination. International Journal on Signal and Image Processing,1(03), 46–49.
3. Garg, T., & Khurana, S. S. (2014). Comparison of classification techniques for intrusion detection dataset using WEKA. In International conference on recent advances and innovations in engineering (ICRAIE-2014) (pp. 1–5). IEEE.
4. Garge, T., & Kumar, Y. (2014). Combinational feature selection approach for network intrusion detection system. In International conference on parallel (pp. 82–87).
5. Tavallaee, M., & Bagheri, E., Lu, W., & Ghorbani, A. (2009) A detailed analysis of the KDD CUP 99 dataset. In The second IEEE symposium on computational intelligence.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献