Publisher
Springer Science and Business Media LLC
Reference64 articles.
1. Hodo, E.; Bellekens, X.; Hamilton, A.; Dubouilh, P.L.; Iorkyase, E.; Tachtatzis, C.; Atkinson, R.: Threat analysis of iot networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC) (IEEE, 2016), pp. 1–6
2. Gupta, B.; Agrawal, D.P.; Yamaguchi, S.: Handbook of research on modern cryptographic solutions for computer and cyber security (IGI global, 2016)
3. Sharma, P.; Sengupta, J.; Suri, P.: Survey of intrusion detection techniques and architectures in cloud computing. Int. J. High Perform. Comput. Netw. 13(2), 184 (2019)
4. Modi, C.; Patel, D.; Borisaniya, B.; Patel, H.; Patel, A.; Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42 (2013)
5. Salah, K.; Calero, J.M.A.; Zeadally, S.; Al-Mulla, S.; Alzaabi, M.: Using cloud computing to implement a security overlay network. IEEE Secur. Priv. 11(1), 44 (2012)
Cited by
46 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献