Author:
Louati Faten,Ktata Farah Barika,Amous Ikram
Publisher
Springer Science and Business Media LLC
Reference47 articles.
1. Anderson, J.P.: Computer security threat monitoring and surveillance, Technical Report, James P. Anderson Company (1980) https://cir.nii.ac.jp/crid/1573950399661362176
2. Wang, Z., Liu, Y., He, D., Chan, S.: Intrusion detection methods based on integrated deep learning model. Comput. Secur. 103, 102177 (2021)
3. Al-Hawawreh, M., Sitnikova, E., Aboutorab, N.: Asynchronous peer-to-peer federated capability-based targeted ransomware detection model for industrial IoT. IEEE Access 9, 148738–148755 (2021)
4. Louati, F., Ktata, F.B., Amous, I.: An efficient real time intrusion detection system for big data environment. In: ICAART, vol. 3, pp. 1004–1011 (2023)
5. Al-Hawawreh, M., Sitnikova, E., Aboutorab, N.: X-iiotid: a connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things. IEEE Internet Things J. 9(5), 3962–3977 (2021)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献