Author:
Amrutha B. S.,Meghana I.,Tejas R.,Pilare Hrishikesh Vasant,Annapurna D.
Publisher
Springer Nature Singapore
Reference26 articles.
1. https://www.isaca.org/resources/news-and-trends/industry-news/2020/top-cyberattacks-of-2020-and-how-to-build-cyberresiliency
2. https://www.dfs.ny.gov/Twitter_Report
3. Hoque MS et al (2012) An implementation of an intrusion detection system using genetic algorithm. arXiv preprint arXiv:1204.1336
4. Elmrabit N et al (2020) Evaluation of machine learning algorithms for anomaly detection. In: 2020 International conference on cyber security and protection of digital services (cyber security). IEEE
5. Ashoor AS, Gore S (2011) Importance of intrusion detection system (IDS). Int J Sci Eng Res 2(1):1–4
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献