Author:
Rajput Divya,Thakkar Ankit
Reference32 articles.
1. Chung, C.-J., Cui, J. S., Khatkar, P., & Huang, D. (2013). Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations. In 2013 9th International Conference Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom) (pp. 21–30). IEEE.
2. Yongli, Z., Yungui, Z., Weiming, T., & Hongzhi, C. (2013). An improved feature selection algorithm based on MAHALANOBIS distance for network intrusion detection. In 2013 International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS) (pp. 69–73). IEEE.
3. Humphrey, M., Emerson, R., & Beekwilder, N. (2016). Unified, multi-level intrusion detection in private cloud infrastructures. In IEEE International Conference on Smart Cloud (SmartCloud) (pp. 11–15). IEEE.
4. Koli, M. S., & Chavan, M. K. (2017). An advanced method for detection of botnet traffic using intrusion detection system. In 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT) (pp. 481–485). IEEE.
5. Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 9(5), 167575.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献