Author:
Makkar Garima,Jayaraman Malini,Sharma Sonam
Reference20 articles.
1. Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3), 614–634.
2. Goyal, A., & Kumar, C. (2008). GA-NIDS: A genetic algorithm based network intrusion detection system. Northwestern University.
3. Khan, L., Awad, M., & Thuraisingham, B. (2007). A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal—The International Journal on Very Large Data Bases, 16(4), 507–521.
4. Ganapathy, S., Yogesh, P., & Kannan, A. (2011). An intelligent intrusion detection system for mobile ad-hoc networks using classification techniques. Communications in Computer and Information Science, 148, 117–122.
5. Jawhar, M. M. T., & Mehrotra, M. (2010). Anomaly intrusion detection system using hamming network approach. International Journal of Computer Science & Communication, 1(1), 165–169.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献