Author:
Qasem Abdelaziz Alshaikh,Qutqut Mahmoud H.,Alhaj Fatima,Kitana Asem
Funder
Applied Science Private University, Jordan
Publisher
Springer Science and Business Media LLC
Reference29 articles.
1. Ngueajio M, Washington G, Rawat D, Ngueabou Y (2022) Intrusion detection systems using support vector machines on the kddcup’99 and nsl-kdd datasets: A comprehensive survey. In: Intelligent Systems and Applications Conference (IntelliSys), pp 609–629. https://doi.org/10.1007/978-3-031-16078-3_42 . Springer
2. Khraisat A, Alazab A (2021) A critical review of intrusion detection systems in the internet of things: Techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4(1):104293. https://doi.org/10.1186/s42400-021-00077-7
3. Cisco (2020) Cisco annual internet report (2018–2023) white paper. https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html
4. Sharif M, Ahmad S (2022) Efficient cyber intrusion detection technique based on an ensemble classifier. J Theor Appl Inf Technol 100(16):5265–5290
5. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: Techniques, datasets and challenges. J Cybersec 2(20):381–386. https://doi.org/10.1186/s42400-019-0038-7