Author:
Jabez J.,Gowri S.,Vigneshwari S.,Albert Mayan J.,Srinivasulu Senduru
Reference17 articles.
1. Tsai, C.-F., Hsu, Y.-F., Lin, C.-Y., Lin, W.-Y.: Intrusion detection by machine learning a review. Expert Syst. Appl. (2009)
2. Garg, T., Khurana, S.S.: IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), 09–11 May 2014
3. Shambhu, J.P., Upadhyaya, J., Venugopal Govindaraju, F.F.: Proceedings of the 20th International Conference on Data Engineering. IEEE (2004)
4. Kumar, G., Kumar, K., Sachdeva, M.: The Use of Artificial Intelligence Based Techniques for Intrusion Detection: A Review. Published online: 4 September 2010 © Springer Science+Business Media (2010)
5. Lin, C.C., Wang, M.-S.: Genetic-clustering algorithm for intrusion detection system. Int. J. Inf. Comput. Secur. 2, 218–234 (2008)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献