Author:
Eid Heba F.,Darwish Ashraf,Hassanien Aboul Ella,Kim Tai-hoon
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Anderson, J.P.: Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Co., Fort Washington, PA (April 1980)
2. Tsai, C., Hsu, Y., Lin, C., Lin, W.: Intrusion detection by machine learning: A review. Expert Systems with Applications 36, 11994–12000 (2009)
3. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Computer Networks 31, 805–822 (1999)
4. Biermann, E., Cloete, E., Venter, L.M.: A comparison of intrusion detection Systems. Computer and Security 20, 676–683 (2001)
5. Verwoerd, T., Hunt, R.: Intrusion detection techniques and approaches. Computer Communications 25, 1356–1365 (2002)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献