Author:
Marir Naila,Wang Huiqiang
Reference17 articles.
1. Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994–12000 (2009)
2. Janssen, T., Grady, N.: Big data for combating cyber attacks. In: CEUR Workshop Proceedings, Fairfax, vol. 1097, pp. 151–158 (2013)
3. Cardenas, A.A., Manadhata, P.K., Rajan, S.P.: Big data analytics for security. IEEE Secur. Priv. 11(6), 74–76 (2013)
4. Scarfone, K.A., Mell, P.M.: Guide to intrusion detection and prevention systems (IDPS), Special Publication (NIST SP), pp. 800–894 (2007)
5. Jones, A.K., Sielken, R.S.: Computer system intrusion detection: a survey. Technical report, Computer Science Department, University of Virginia (2000)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献