Publisher
Springer Science and Business Media LLC
Subject
Business, Management and Accounting (miscellaneous),Communication,Information Systems
Reference64 articles.
1. Abraham A, Thomas J (2006) Distributed intrusion detection systems: A computational intelligence approach. Applications of Information Systems to Homeland Security and Defense: pp. 107–137
2. Adamu TD, Rao VS (2014) A cost sensitive machine learning approach for intrusion detection. Global Journal of Computer Science and Technology
3. Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J ComputSci 25:152–160
4. Allen J, Christie A, Fithen W, McHugh J, Pickel J (2000) State of the practice of intrusion detection technologies (No. CMU/SEI-99-TR-028). CMU Pittsburg, PA, Software Engineering Inst
5. Anderson JP (1980) Computer security threat and monitoring surveillance. Technical Report 79F26400, James P. Anderson Co, Fort Washington, PA
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献