Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Denning, D.E.: An Intrusion-detection Model. IEEE Trans. Software Eng. 2, 122–132 (1987)
2. Lauf, A.P., Peters, R.A., Robinson, W.H.: A Distributed Intrusion Detection System for Resource-constrained Devices in Ad-hoc Networks. Ad Hoc Networks 8, 253–266 (2010)
3. Beghdad, R.: Efficient Deterministic Method for Detecting New U2R attacks. Computer Communications 32, 1104–1110 (2009)
4. Zhang, X.Q., Gu, C.H.: A Method to Extract Network Intrusion Detection Feature. Journal of South China University of Technology (Natural Science) 38, 81–86 (2010)
5. Gupta, K.K., Nath, B., Kotagiri, R.: Layered Approach Using Conditional Random Fields for Intrusion Detection. IEEE Transactions on Dependable and Secure Computing 7, 35–49 (2010)