Author:
Hussain Jamal,Lalmuanawma Samuel
Reference23 articles.
1. Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J. (2003). A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of the 3rd SIAM Conference on Data Mining.
2. Lee, J. H., Sohn, S. G., Chang, B. H., Chung, T. M. (2009). PKG-VUL: Security vulnerability evaluation and patch framework for package-based systems. ETRI Journal, 31(5), 554–564.
3. Beauquier, J., Hu, Y. (2008). Intrusion detection based on distance combination. International Journal of Computer Science, 2(3), 178–186.
4. Kim, G., Lee, S., Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690–1700.
5. Depren, O., Topallar, M., Anarim, E., Ciliz, M. K. (2005). An intelligent intrusion detection system for anomaly and misuse detection in computer networks. Expert Systems with Applications, 29(4), 713–722.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献