Author:
Sudha M. Swarna,Valarmathi K.
Publisher
Springer Science and Business Media LLC
Reference27 articles.
1. Alrawashdeh K, Purdy C (2016) Toward an online anomaly intrusion detection system based on deep learning. In: 2016 15th IEEE international conference on machine learning and applications (ICMLA), pp. 195–200, IEEE. https://doi.org/10.1109/ICMLA.2016.0040
2. Cheng Q, Zhou Y, Feng Y, Liu Z (2020) An unsupervised ensemble framework for node anomaly behavior detection in social network. Soft Comput 24(9):6421–6431
3. Chiba Z, Abghour N, Moussaid K, El Omri A, Rida M (2018) A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. ComputSecur 75:36–58
4. Chikh R, Chikhi S (2019) Clustered negative selection algorithm and fruit fly optimization for email spam detection. J Ambient Intell Human Comput 10:143–152. https://doi.org/10.1007/s12652-017-0621-2
5. Dadfarnia M, Adibnia F, Abadi M, Dorri A (2020) Incremental collusive fraud detection in large-scale online auction networks. J Supercomput 76:7416–7437. https://doi.org/10.1007/s11227-020-03170-9
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献