Author:
Sindhura S.,Phani Praveen S.,Madhuri A.,Swapna D.
Publisher
Springer Nature Singapore
Reference17 articles.
1. Swapna, D., Phani Praveen, S.: An exploration of distributed access control mechanism using block chain. In: Smart Intelligent Computing and Applications. Springer, Singapore, 13–20 (2020)
2. Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: Are view. Appl Soft Comput J 10, 1–35 (2010)
3. Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the SIAM Conference on Data Mining (2003)
4. Kumar, S., Spafford, E.H.: A pattern matching model for misuse intrusion detection. In: Proceedings of the 17th National Computer Security Conference, pp. 11–21 (1994)
5. Gong, S.: Feature selection method for network intrusion based on GQPSO attribute reduction. In: International Conference on Multimedia Technology (ICMT), pp 6365–6368 (2011)