Author:
Alzubi Qusay M.,Anbar Mohammed,Alqattan Zakaria N. M.,Al-Betar Mohammed Azmi,Abdullah Rosni
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference28 articles.
1. Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690–1700
2. Anbar M, Abdullah R, Hasbullah IH, Chong YW, Elejla OE (2016) Comparative performance analysis of classification algorithms for intrusion detection system. In: 2016 14th annual conference on privacy, security and trust (PST). IEEE, pp 282–288
3. Hamed T, Ernst JB, Kremer SC (2018) A survey and taxonomy on data and pre-processing techniques of intrusion detection systems. Computer and network security essentials. Springer, Cham, pp 113–134
4. Debar H, Dacier M, Wespi A (2000) A revised taxonomy for intrusion-detection systems. Ann Telecommun 55(7):361–378
5. Balasaraswathi VR, Sugumaran M, Hamid Y (2017) Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. J Commun Inf Netw 2(4):107–119
Cited by
59 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献