Author:
Ahmed Mohiuddin,Mahmood Abdun Naser
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Statistics, Probability and Uncertainty,Computer Science Applications,Business, Management and Accounting (miscellaneous)
Reference38 articles.
1. Hansman S, Hunt R (2005) A taxonomy of network and computer attacks. Comput Secur 24(1):31–43
2. Roesch M (1999) Snort—lightweight intrusion detection for networks. In: Proceedings of the 13th USENIX conference on system administration, LISA ’99. USENIX Association, Berkeley, CA, USA, pp 229–238
3. Shi Y, Tian Y, Kou G, Peng Y, Li J (2011) Optimization based data mining: theory and applications. Springer, New York
4. Shi Y (2010) Multiple criteria optimization-based data mining methods and applications: a systematic survey. Knowl Inf Syst 24(3):369–391
5. Denning DE (1987) An intrusion-detection model. IEEE Trans Softw Eng 13(2):222–232
Cited by
52 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献