Author:
Zuo Xiaojun,Chen Ze,Dong Limian,Chang Jie,Hou Botao
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference15 articles.
1. Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30(6–7):353–375
2. Li Y, Yang L, Ding J (2016) A minimum enclosing ball-based support vector machine approach for detection of phishing websites. Optik Int J Light Electron Opt 127(1):345–351
3. Yufei W, Ting Z, Shaoyu LI, Baohua Z, Yujie LI (2013) An intrusion detection method for electric power information network based on improved minimum enclosing ball vector machine. Power Syst Technol 37(9):2675–2680
4. Shamshirband S, Amini A, Anuar NB, Mat Kiah ML, Teh YW, Furnell S (2014) D-ficca: a density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 55:212–226
5. Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inform J 15(1):37–50
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献