Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference50 articles.
1. (1999) Kdd cup 1999: computer network intrusion detection. https://kdd.org/kdd-cup/view/kdd-cup-1999/Tasks.
2. Agilent Technologies. The journal of internet test methodologies. 2007. http://www.ixiacom.com/pdfs/test_plans/agilent_journal_of_internet_test_methodologies.pdf.
3. Banerjee U, Vashishtha A, Saxena M. Evaluation of the capabilities of wireshark as a tool for intrusion detection. Int J Comput Appl. 2010;6(7):1–5. https://doi.org/10.5120/1092-1427. (published By Foundation of Computer Science).
4. Bul’ajoul W, James A, Pannu M. Improving network intrusion detection system performance through quality of service configuration and parallel technology. J Comput Syst Sci. 2015;81(6):981–99. https://doi.org/10.1016/j.jcss.2014.12.012. (special Issue on Optimisation, Security, Privacy and Trust in E-business Systemsspecial Issue on Optimisation, Security, Privacy and Trust in E-business Systemsspecial Issue on Optimisation, Security, Privacy and Trust in E-business Systems).
5. Canadian Institute for Cybersecurity. Applications—icflowmeter (formerly iscxflowmeter). 2017a. https://www.unb.ca/cic/research/applications.html.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A TabPFN-based intrusion detection system for the industrial internet of things;The Journal of Supercomputing;2024-05-30
2. Feature Engineering Considerations in IoT: A Case Study;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2024