Author:
Rahul-Vigneswaran K.,Poornachandran Prabaharan,Soman KP
Reference19 articles.
1. Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey.
ArXiv:701.02145
2. Manzoor MA, Morgan Y (2017) Network intrusion detection system using apache storm. Probe 4107–4166
3. Nassar, M., al Bouna B, Malluhi Q (2013) Secure outsourcing of network flow data analysis. In: 2013 IEEE international congress on big data (BigData Congress), pp 431–432, IEEE
4. Suthaharan S (2014) Big data classification: problems and challenges in network intrusion prediction with machine learning. ACM SIGMETRICS Perform Eval Rev 41(4):70–73
5. Meng F, Fu Y, Lou F (2018) A network threat analysis method combined with kernel PCA and LSTM-RNN. In: 2018 tenth international conference on advanced computational intelligence (ICACI), IEEE, pp 508–513
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献