Author:
Satpute Khushboo,Agrawal Shikha,Agrawal Jitendra,Sharma Sanjeev
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Denning, D.: An intrusion detection model. IEEE Transactions of Software Engineering 13(2), 222–232 (1987)
2. Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey. In: Managing Cyber Threats: Issues, Approaches, and Challenges, p. 330. Springer (2005)
3. Garcia-Teodoroa, P., Diaz-Verdejoa, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based network intrusion detection; technique, systems and challenges. Compuers and Security 28, 18–28 (2009)
4. Kennedy, J., Eberhart, R.C.: Particle Swarm Optimization. In: Proceedings of the IEEE International Joint Conference on Neural Networks, pp. 1942–1948 (1995)
5. Zainal, A., Maarof, M.A., Shamsuddin, S.M.: Feature Selection Using Rough Set in Intrusion Detection. In: IEEE TENCON 2006, Hongkong, November 14-17 (2006)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Systematic Literature Review on Swarm Intelligence Based Intrusion Detection System: Past, Present and Future;Archives of Computational Methods in Engineering;2024-03-01
2. Demystifying Intrusion Detection Process using Machine Learning Techniques;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
3. A PSO and Random Forest-based Hybrid Model for Effective Intrusion Detection;2023 11th International Conference on Intelligent Systems and Embedded Design (ISED);2023-12-15
4. A Systematic Review on Anomaly Detection;International Journal of Advanced Research in Science, Communication and Technology;2023-03-20
5. A Brief Review Particle Swarm Optimization on Intrusion Detection System;International Conference on Innovative Computing and Communications;2023