Author:
Mohamed Ashara Banu,Idris Norbik Bashah,Shanmugum Bharanidharan
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Kemmerer, D., Vigna, G.: Intrusion detection: A brief history and overview. Computer 35(4), 27–30 (2002)
2. Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications 30(1), 114–132 (2007)
3. Lunt, T.F.: Automated audit trail analysis and intrusion detection: A survey. In: 11th National Computer Security Conference (1988)
4. Dewan, M.F., Mohammad, Z.R.: Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm. Journal of Computers 5(1) (2010)
5. Lunt, T.F., Tamaru, A., Gilham, F., Jagannathan, R., Jalali, C., Neumann, P.G., Javitz, H.S., Valdes, A., Garvey, T.D.: A Real-Time Intrusion-Detection Expert System (IDES). Final Technical Report, SRI International (1992)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献