Author:
Gómez J.,Gil C.,Baños R.,Márquez A. L.,Montoya F. G.,Montoya M. G.
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference30 articles.
1. Anchor KP, Zydallis JB, Gunsch GH, Lamont GB (2002) Extending the computer defense immune system: network intrusion detection with a multiobjective evolutionary programming approach. In: Proceedings of the First International Conference on artificial immune systems, pp 12–21
2. Aydin MA, Zaim AH, Ceylan KG (2009) A hybrid intrusion detection system design for computer network security. Comput Electr Eng 35(3):517–526
3. Bace R, Mell P (2001) Special publication on intrusion detection systems. Technical Report SP 800-31, National Institute of Standards and Technology, Gaithersburg
4. Barbara D, Wu N, Jajodia S (2001) Detecting novel network intrusions using Bayes estimators. In: Proceedings of first SIAM Conference on data mining, Chicago, pp 24–29
5. Beale J (2004) Snort 2.1 intrusion detection, 2nd edn. Syngress, USA
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献