Author:
Ali Rahman,Ali Asmat,Iqbal Farkhund,Khattak Asad Masood,Aleem Saiqa
Reference33 articles.
1. Vacca, J.R.: Computer and Information Security Handbook. Newnes, Oxford (2012)
2. Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)
3. Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2015)
4. Torres, J.M., Comesaña, C.I., García-Nieto, P.J.: Machine learning techniques applied to cybersecurity. Int. J. Mach. Learn. Cybern. 10(10), 2823–2836 (2019)
5. Xin, Y., et al.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365–35381 (2018)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献