Author:
Ghazy Rania A.,EL-Rabaie El-Sayed M.,Dessouky Moawad I.,El-Fishawy Nawal A.,Abd El-Samie Fathi E.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference14 articles.
1. Sen, S. (2015). Chapter 4: A survey of intrusion detection systems using evolutionary computation. In X. S. Yang, S. F. Chien, & T. O. Ting (Eds.), Bio-inspired computation on telecommunication (pp. 73–94). Burlington: Morgan Kaufmann.
2. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. (2009). A detailed analysis of the KDD CUP 99 data set. In: Second IEEE symposium on computational intelligence.
3. http://www.unb.ca/cic/datasets/nsl.html
. Accessed 11 April 2016.
4. Elrawy, M. F., Abdelhamid, T. K., & Mohamed, A. M. (2013). IDS in telecommunication network using PCA. International Journal of Computer Networks & Communications (IJCNC), 5(4), 147–157.
5. Zargar, G., & Baghaie, T. (2012). Category-based intrusion detection using PCA. Journal of Information Security, 3, 259–271.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献