Author:
de la Hoz Eduardo,Ortiz Andrés,Ortega Julio,de la Hoz Emiro
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Computing Surveys 41(3) (2009)
2. Lecture Notes in Computer Science;A. Hoffman,2003
3. Network Security Lab - Knowledge Discovery and Data Mining (NSL-KDD) (2007),
http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
4. Tavallaee, M., Stakhanova, N., Ghorbani, A.: Toward credible evaluation of anomaly-based intrusion-detection methods. Trans. Sys. Man Cyber Part C 40, 516–524 (2010)
5. Kayacik, H., Zincir-Heywood, A., Heywood, M.: A hierarchical som-based intrusion detection system. Journal Engineering Applications of Artificial Intelligence 20(4), 439–451 (2007)
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献