Author:
Slamet ,Mohamed Izzeldin I.,Samsuri Fahmi
Reference18 articles.
1. Öğütçü G, Testik ÖM, Chouseinoglou O (2016) Analysis of personal information security behavior and awareness. Comput Secur 56:83–93
2. Huang L, Wang X (2016) On the construction of university campus culture under the network environment. In: 3rd international conference on education, management and computing technology (ICEMCT 2016)
3. Chun G, Ping Y, Liu N, Luo S-S (2016) A two-level hybrid approach for intrusion detection. Neuro Comput 214:391–400
4. Gisung K, Seungmin L, Sehun K (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4 Part 2):1690–1700
5. Peng J et al (2006) A hybrid intrusion detection and visualization system. In: Proceedings of the 13th annual IEEE international symposium and workshop on engineering of computer based systems, p 2
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hybrid Intrusion Detection System;International Journal of Next-Generation Computing;2021-11-26