Author:
Abirami M. S.,Yash Umaretiya,Singh Sonal
Reference27 articles.
1. Yolacan Esra, N., Kaeli David, R.: A framework for studying new approaches to anomaly detection. Int. J. Inf. Secur. Sci. (2016)
2. Singh, P.L., Akhilesh, T.: Survey on intrusion detection using data mining methods. Int. J. Sci. Adv. Res. Technol. (2016)
3. Kabir, E., Hu, J., Wang, H., Zhuo, G.: A novel statistical technique for intrusion detection systems. Future Gener. Comput. Syst. 79, 303–318 (2018)
4. Shah, S.A.R., Issac, B.: Performance comparison of intrusion detection systems and application of machine learning to snort system. Future Gener. Comput. Syst. 80, 157–170 (2018)
5. Umer, M.F., Sher, M., Bi, Y.: Flow-based intrusion detection: techniques and challenges. Comput. Secur. 70, 238–254 (2017)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献