Author:
Varghese Josy Elsa,Muniyal Balachandra
Reference25 articles.
1. Sarkar, M.: Fuzzy-rough nearest neighbor algorithms in classification. Fuzzy Sets Syst. 158(19), 2134–2152 (2007)
2. The NSL KDD dataset (2016).
http://nsl.cs.unb.ca/NSL-KDD/
. Last Accessed 21 July 2017
3. Weka- data mining machine learning software (2016).
http://www.cs.waikato.ac.nz/ml/weka/
. Last Accessed 24 Mar 2017
4. Communications in Computer and Information Science;E Beqiri,2009
5. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16, 303–336 (2014)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Recommendations for DDOS Threats Using Tableau;Proceedings of Data Analytics and Management;2021-11-22
2. Design and analysis of efficient neural intrusion detection for wireless sensor networks;Concurrency and Computation: Practice and Experience;2020-12-17
3. Accelerated Neural Intrusion Detection for Wireless Sensor Networks;Advances in Intelligent Networking and Collaborative Systems;2020-08-21