Author:
Sheikh Zakir Ahmad,Singh Yashwant
Publisher
Springer Nature Singapore
Reference27 articles.
1. O. Al-Jarrah, A. Arafat, Network intrusion detection system using attack behavior classification. in 2014 5th International Conference on Information and Communication Systems, ICICS 2014 (2014). https://doi.org/10.1109/IACS.2014.6841978
2. K. Sharma, Intrusion detection system (IDS): types, techniques, and applications. Accessed 19 April 2023. [Online]. Available: https://www.knowledgehut.com/blog/security/intrusion-detection-system
3. Z.A. Sheikh, Y. Singh, P.K. Singh, K.Z. Ghafoor, Intelligent and secure framework for critical infrastructure (CPS): current trends, challenges, and future scope. Comput. Commun. 193(July), 302–331 (2022). https://doi.org/10.1016/j.comcom.2022.07.007
4. I.H. Sarker, Y.B. Abushark, F. Alsolami, A.I. Khan, IntruDTree: a machine learning based cyber security intrusion detection model. Symmetry (Basel) 12(5), 1–15 (2020). https://doi.org/10.3390/SYM12050754
5. Z.A. Sheikh, Y. Singh, S. Tanwar, R. Sharma, F. Turcanu, EISM-CPS : an enhanced intelligent security methodology for cyber-physical systems through hyper-parameter optimization. Mathematics-MDPI 11(189), 1–17 (2023)