Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference25 articles.
1. Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad hoc Networks, 10(7), 1497–1516.
2. Singhal, A., & Ou, X. (2017). Security risk analysis of enterprise networks using probabilistic attack graphs. In Network security metrics (pp. 53–73). Springer, Cham.
3. Tripathi, D., Ramachandra Reddy, B., Padmanabha Reddy, Y. C. A., Shukla, A. K., Kumar, R. K., & Sharma, N. K. BAT algorithm based feature selection: Application in credit scoring. Journal of Intelligent & Fuzzy Systems, (Preprint), 1–10.
4. Lakhina, A., Crovella, M., &Diot, C. (2005). Mining anomalies using traffic feature distributions. In ACM SIGCOMM computer communication review (Vol. 35, No. 4, pp. 217–228). ACM.
5. Lakhina, A., Papagiannaki, K., Crovella, M., Diot, C., Kolaczyk, E. D., & Taft, N. (2004). Structural analysis of network traffic flows. In ACM SIGMETRICS performance evaluation review (Vol. 32, No. 1, pp. 61–72). ACM.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献