Author:
Mehare Vaishali,Thakur Ramjeevan Singh
Reference25 articles.
1. Abhya, K.K., Ranjeeta, J., Sumaiya, A.: Data mining techniques for intrusion detection: a review. IJARCCE 3(6), 6938–6942 (2014)
2. Tammayee, S.S., Suhasini, A.: A survey and comparative study of different data mining techniques for implementation of intrusion detection system. INPRESSCO Int. J. Curr. Eng. Technol. 4(3), 1288–1291 (2014)
3. Shikha, A., Jitendra, A.: Survey on anomaly detection using data mining techniques. In: 19th International Conference on Knowledge Based Intelligent Information and Engineering System, pp. 708–713. Elsevier (2015)
4. Nema, A., Tiwari, B., Tiwari, V.: Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 26–31, ACM (2016)
5. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3) (2009)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing;Archives of Computational Methods in Engineering;2021-04-07
2. Machine learning in cybersecurity: a comprehensive survey;The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology;2020-09-19