Author:
Liao Niandong,Li Xiaoxuan
Funder
“Practical Innovation and Enhancement of Entrepreneurial Ability” for Professional Degree Postgraduates of Changsha University of Science & Technology
hunan provincial engineering research center of electric transportation and smart distribution network
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computational Theory and Mathematics,Theoretical Computer Science,Software
Reference45 articles.
1. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16, 303–336 (2014)
2. H. Sagha and S.B. Shouraki, et al., Genetic ink drop spread, in 2008 2nd International Symposium on Intelligent Information Technology Application 2 (2008), 603–607.
3. Arunraj, N., Hable, R., et al.: Comparison of supervised, semi-supervised and unsupervised learning methods in network intrusion detection system (NIDS) application, Anwendungen und Konzepte der. Wirtschaftsinformatik 6, 10–19 (2017)
4. Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296–303 (2017)
5. Heller, K., Svore, K. et al.: One class support vector machines for detecting anomalous windows registry accesses.In: Proceedings of Workshop on Data Mining for Computer Security (2003)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献