Author:
Khan Suleman,Gani Abdullah,Wahab Ainuddin Wahid Abdul,Singh Prem Kumar
Publisher
Springer Science and Business Media LLC
Reference40 articles.
1. Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.-A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009 (2009)
2. Institute, P.: 2014 Global report on the cost of cyber crime. HP Enterprise Security p. 31 (2014)
3. Yi, M.A.; Phyu, T.: Layering based network intrusion detection system to enhance network attacks detection. Int. J. Sci. Res. 2(9), 10091302 (2013)
4. Xiang, Y.; Li, K.; Zhou, W.: Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans. Inf. Forensics Secur. 6, 426–437 (2011)
5. Khan, S.; Shiraz, M.; Wahab, A.W.A.; Gani, A.; Han, Q.; Rahman, Z.B.A.: A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing. Sci. World J. 2014, 547062 (2014). doi: 10.1155/2014/547062
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献