Author:
Ashok Kumar D.,Venugopalan S. R.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference33 articles.
1. Kumar DA, Venugopalan SR (2017) Intrusion detection by initial classification-based on protocol type. Int J Adv Intell Paradig 9(2–3):122–138
2. Anderson JP (1980) Computer security threat monitoring and surveillance (Vol. 17). Technical report. James P. Anderson Company, Fort Washington
3. Youssef A, Emam A (2011) Network intrusion detection using data mining and network behaviour analysis. Int J Comput Sci Inf Technol 3(6):87
4. Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inform J 15(1):37–50
5. Laskov P, Düssel P, Schäfer C, Rieck K (2005) Learning intrusion detection: supervised or unsupervised? In: Image analysis and processing. Springer, Heidelberg, pp 50–57
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献