Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference102 articles.
1. Abas EAER, Abdelkader H, Keshk A (2015) Artificial immune system based intrusion detection. In: 2015 IEEE seventh international conference on intelligent computing and information systems (ICICIS), pp 542–546. Institute of Electrical & Electronics Engineers (IEEE).
https://doi.org/10.1109/intelcis.2015.7397274
2. Agrawal A, Mohammed S, Fiaidhi J (2016) Developing data mining techniques for intruder detection in network traffic. Int J Secur Appl 10(8):335–342.
https://doi.org/10.14257/ijsia.2016.10.8.29
3. Al-Enezi J, Abbod M, Alsharhan S (2010) Artificial immune systems-models, algorithms and applications.
http://www.arpapress.com/Volumes/Vol3Issue2/IJRRAS_3_2_01.pdf
4. Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986–2998.
https://doi.org/10.1109/TC.2016.2519914
5. Amer SH, Hamilton J (2010) Intrusion detection systems (ids) taxonomy-a short review. Def Cyber Secur 13(2):23–30
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献